WO2013185303A1 - Encryption bitmap for a device-to-device expression - Google Patents

Encryption bitmap for a device-to-device expression Download PDF

Info

Publication number
WO2013185303A1
WO2013185303A1 PCT/CN2012/076822 CN2012076822W WO2013185303A1 WO 2013185303 A1 WO2013185303 A1 WO 2013185303A1 CN 2012076822 W CN2012076822 W CN 2012076822W WO 2013185303 A1 WO2013185303 A1 WO 2013185303A1
Authority
WO
WIPO (PCT)
Prior art keywords
message sets
encryption
message
subset
bitmap
Prior art date
Application number
PCT/CN2012/076822
Other languages
French (fr)
Inventor
MingKai Nan
Original Assignee
Qualcomm Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Incorporated filed Critical Qualcomm Incorporated
Priority to PCT/CN2012/076822 priority Critical patent/WO2013185303A1/en
Publication of WO2013185303A1 publication Critical patent/WO2013185303A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Definitions

  • the present disclosure relates generally to communication systems, and more particularly, to an encryption bitmap for a device-to-device expression.
  • Wireless communication systems are widely deployed to provide various telecommunication services such as telephony, video, data, messaging, and broadcasts.
  • Typical wireless communication systems may employ multiple-access technologies capable of supporting communication with multiple users by sharing available system resources (e.g., bandwidth, transmit power).
  • multiple-access technologies include code division multiple access (CDMA) systems, time division multiple access (TDMA) systems, frequency division multiple access (FDMA) systems, orthogonal frequency division multiple access (OFDMA) systems, single-carrier frequency division multiple access (SC-FDMA) systems, and time division synchronous code division multiple access (TD-SCDMA) systems.
  • CDMA code division multiple access
  • TDMA time division multiple access
  • FDMA frequency division multiple access
  • OFDMA orthogonal frequency division multiple access
  • SC-FDMA single-carrier frequency division multiple access
  • TD-SCDMA time division synchronous code division multiple access
  • LTE Long Term Evolution
  • UMTS Universal Mobile Telecommunications System
  • 3GPP Third Generation Partnership Project
  • LTE is designed to better support mobile broadband Internet access by improving spectral efficiency, lower costs, improve services, make use of new spectrum, and better integrate with other open standards using OFDMA on the downlink (DL), SC-FDMA on the uplink (UL), and multiple-input multiple-output (MIMO) antenna technology.
  • LTE may support direct device-to-device communication. As the demand for device-to-device communication increases, there exists a need for methods/apparatuses for supporting device-to-device communication within LTE.
  • a method, a computer program product, and an apparatus are provided.
  • the apparatus generates a message including a plurality of message sets.
  • the apparatus encrypts a subset of the message sets.
  • the apparatus generates an encryption bitmap indicating the encrypted subset of the message sets and a remaining unencrypted subset of the message sets.
  • the apparatus broadcasts the encryption bitmap and the message including the encrypted subset of the message sets and the remaining unencrypted subset of the message sets.
  • a method, a computer program product, and an apparatus receives a message including a plurality of message sets and an encryption bitmap.
  • the encryption bitmap indicates an encrypted subset of the message sets and a remaining unencrypted subset of the message sets.
  • the apparatus decrypts the encrypted subset of the message sets.
  • FIG. 1 is a diagram illustrating an example of a network architecture.
  • FIG. 2 is a diagram illustrating an example of an access network.
  • FIG. 3 is a diagram illustrating a device-to-device communications network.
  • FIG. 4 is a diagram for illustrating an exemplary method.
  • FIG. 5 is a flow chart of a first method of wireless communication.
  • FIG. 6 is a flow chart of a second method of wireless communication.
  • FIG. 7 is a conceptual data flow diagram illustrating the data flow between different modules/means/components in an exemplary apparatus.
  • FIG. 8 is a diagram illustrating an example of a hardware implementation for apparatus employing a processing system.
  • processors include microprocessors, microcontrollers, digital signal processors (DSPs), field programmable gate arrays (FPGAs), programmable logic devices (PLDs), state machines, gated logic, discrete hardware circuits, and other suitable hardware configured to perform the various functionality described throughout this disclosure.
  • DSPs digital signal processors
  • FPGAs field programmable gate arrays
  • PLDs programmable logic devices
  • state machines gated logic, discrete hardware circuits, and other suitable hardware configured to perform the various functionality described throughout this disclosure.
  • One or more processors in the processing system may execute software.
  • Software shall be construed broadly to mean instructions, instruction sets, code, code segments, program code, programs, subprograms, software modules, applications, software applications, software packages, routines, subroutines, objects, executables, threads of execution, procedures, functions, etc., whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise.
  • the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or encoded as one or more instructions or code on a computer-readable medium.
  • Computer- readable media includes computer storage media. Storage media may be any available media that can be accessed by a computer.
  • such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
  • Disk and disc includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and Blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
  • FIG. 1 is a diagram illustrating an LTE network architecture 100.
  • the LTE network architecture 100 may be referred to as an Evolved Packet System (EPS) 100.
  • the EPS 100 may include one or more user equipment (UE) 102, an Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) 104, an Evolved Packet Core (EPC) 110, a Home Subscriber Server (HSS) 120, and an Operator's IP Services 122.
  • the EPS can interconnect with other access networks, but for simplicity those entities/interfaces are not shown.
  • the EPS provides packet-switched services, however, as those skilled in the art will readily appreciate, the various concepts presented throughout this disclosure may be extended to networks providing circuit-switched services.
  • the E-UTRAN includes the evolved Node B (eNB) 106 and other eNBs 108.
  • eNB evolved Node B
  • the eNB 106 provides user and control planes protocol terminations toward the UE 102.
  • the eNB 106 may be connected to the other eNBs 108 via a backhaul (e.g., an X2 interface).
  • the eNB 106 may also be referred to as a base station, a base transceiver station, a radio base station, a radio transceiver, a transceiver function, a basic service set (BSS), an extended service set (ESS), or some other suitable terminology.
  • the eNB 106 provides an access point to the EPC 110 for a UE 102.
  • Examples of UEs 102 include a cellular phone, a smart phone, a session initiation protocol (SIP) phone, a laptop, a personal digital assistant (PDA), a satellite radio, a global positioning system, a multimedia device, a video device, a digital audio player (e.g., MP3 player), a camera, a game console, or any other similar functioning device.
  • SIP session initiation protocol
  • PDA personal digital assistant
  • the UE 102 may also be referred to by those skilled in the art as a mobile station, a subscriber station, a mobile unit, a subscriber unit, a wireless unit, a remote unit, a mobile device, a wireless device, a wireless communications device, a remote device, a mobile subscriber station, an access terminal, a mobile terminal, a wireless terminal, a remote terminal, a handset, a user agent, a mobile client, a client, or some other suitable terminology.
  • the eNB 106 is connected by an SI interface to the EPC 110.
  • the EPC 110 includes a Mobility Management Entity (MME) 112, other MMEs 114, a Serving Gateway 116, and a Packet Data Network (PDN) Gateway 118.
  • MME Mobility Management Entity
  • PDN Packet Data Network
  • the MME 112 is the control node that processes the signaling between the UE 102 and the EPC 110. Generally, the MME 112 provides bearer and connection management. All user IP packets are transferred through the Serving Gateway 116, which itself is connected to the PDN Gateway 118. The PDN Gateway 118 provides UE IP address allocation as well as other functions. The PDN Gateway 118 is connected to the Operator's IP Services 122.
  • the Operator's IP Services 122 may include the Internet, the Intranet, an IP Multimedia Subsystem (IMS), and a PS Streaming Service (PSS).
  • IMS IP Multimedia Subsystem
  • PSS PS Streaming Service
  • FIG. 2 is a diagram illustrating an example of an access network 200 in an LTE network architecture.
  • the access network 200 is divided into a number of cellular regions (cells) 202.
  • One or more lower power class eNBs 208 may have cellular regions 210 that overlap with one or more of the cells 202.
  • the lower power class eNB 208 may be a femto cell (e.g., home eNB (HeNB)), pico cell, micro cell, or remote radio head (RRH).
  • HeNB home eNB
  • RRH remote radio head
  • the macro eNBs 204 are each assigned to a respective cell 202 and are configured to provide an access point to the EPC 110 for all the UEs 206, 212 in the cells 202.
  • Some of the UEs 212 may be in device-to- device communication. There is no centralized controller in this example of an access network 200, but a centralized controller may be used in alternative configurations.
  • the eNBs 204 are responsible for all radio related functions including radio bearer control, admission control, mobility control, scheduling, security, and connectivity to the serving gateway 116.
  • OFDM frequency division duplexing
  • TDD time division duplexing
  • EV-DO and UMB are air interface standards promulgated by the 3rd Generation Partnership Project 2 (3GPP2) as part of the CDMA2000 family of standards and employs CDMA to provide broadband Internet access to mobile stations. These concepts may also be extended to Universal Terrestrial Radio Access (UTRA) employing Wideband-CDMA (W- CDMA) and other variants of CDMA, such as TD-SCDMA; Global System for Mobile Communications (GSM) employing TDMA; and Evolved UTRA (E-UTRA), IEEE 802.1 1 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, and Flash-OFDM employing OFDMA.
  • UTRA, E-UTRA, UMTS, LTE and GSM are described in documents from the 3 GPP organization.
  • CDMA2000 and UMB are described in documents from the 3GPP2 organization. The actual wireless communication standard and the multiple access technology employed will depend on the specific application and the overall design constraints imposed on the system.
  • FIG. 3 is a diagram of a device-to-device communications system 300.
  • the device-to-device communications system 300 includes a plurality of UEs 304, 306, 308, 310.
  • the device-to-device communications system 300 may overlap with a cellular communications system, such as for example, a wireless wide area network (WW AN).
  • WW AN wireless wide area network
  • Some of the UEs 304, 306, 308, 310 may communicate together in device-to-device communication using DL/UL WWAN spectrum, some may communicate with the base station 302, and some may do both.
  • the UEs 308, 310 are in device-to-device communication and the UEs 304, 306 are in device-to-device communication.
  • the UEs 304, 306 are also communicating with the base station 302.
  • the exemplary methods and apparatuses discussed infra are applicable to any of a variety of wireless device-to-device communications systems, such as for example, a wireless device-to-device communication system based on FlashLinQ, WiMedia, Bluetooth, ZigBee, or Wi-Fi based on the IEEE 802.1 1 standard.
  • a wireless device-to-device communication system based on FlashLinQ, WiMedia, Bluetooth, ZigBee, or Wi-Fi based on the IEEE 802.1 1 standard.
  • the exemplary methods and apparatus are discussed within the context of LTE.
  • one of ordinary skill in the art would understand that the exemplary methods and apparatuses are applicable more generally to a variety of other wireless device-to-device communication systems.
  • UEs may periodically broadcast expressions to advertise services and/or available applications; provide contact, location, or identify information; and/or provide other information to other UEs.
  • a user of the UEs may desire to keep portions of broadcasted expressions private while allowing other portions of the broadcasted expressions to be public. As such, methods are needed for facilitating decrypting broadcast expressions that include both unencrypted and encrypted portions.
  • FIG. 4 is a diagram 400 for illustrating an exemplary method.
  • the UE 408 generates 406 an expression.
  • the expression includes a plurality of information elements and an encryption bitmap.
  • Each information element may be referred to as a message set.
  • the information elements are either encrypted or unencrypted. Some of the information elements may never by encrypted, such as for example, information element 1. Some of the information elements may be encrypted or unencrypted, such as for example, the information elements 2-7. Some of the information elements may always be encrypted, such as for example, information element 8.
  • the encryption bitmap includes a plurality of bits for indicating which of the information elements are encrypted/unencrypted.
  • the encryption bitmap may indicate that an information element is encrypted by setting a bit corresponding to the information element to a "1" and indicate that an information element is unencrypted by setting the bit corresponding to the information element to a "0.”
  • Each of the bits may correspond to a different one of the information elements. However, in one configuration, a particular bit may correspond to more than one information element, and therefore each of the bits may correspond to a different subset of information elements.
  • the encryption bitmap may only include bits for information elements that may be encrypted/unencrypted. As such, the encryption bitmap may not include bits for information elements that are always unencrypted (e.g., information element 1) or always encrypted (e.g., information element 8).
  • the UE 408 After generating an expression including a plurality of unencrypted and/or encrypted information elements and the encryption bitmap, the UE 408 broadcasts the expression 410.
  • the UE 412 receives the broadcasted expression 410. From the received expression 410, the UE 412 obtains the information elements and the encryption bitmap.
  • the UE 412 may provide information in the unencrypted information elements to a user of the UE 412. If the UE 412 has a security key and/or knows a security algorithm for decrypting encrypted information elements, the UE 412 may decrypt the information elements that are indicated as being encrypted in the encryption bitmap.
  • FIG. 5 is a flow chart 500 of a first method of wireless communication. The method may be performed by a UE.
  • the UE generates a message including a plurality of message sets.
  • the UE encrypts a subset of the message sets.
  • the UE generates an encryption bitmap indicating the encrypted subset of the message sets and a remaining unencrypted subset of the message sets.
  • the UE broadcasts the encryption bitmap and the message including the encrypted subset of the message sets and the remaining unencrypted subset of the message sets.
  • the encryption bitmap may include a plurality of bits. Each of the bits may correspond to a different one of the message sets.
  • the encryption bitmap may include n bits for n message sets of m message sets, where m > n.
  • the UE 408 may generate a message including an identifier, the first name of a user of the UE 408, the last name of the user, a gender of the user, an e-mail address of the user, a birth date of the user, an address of the user, and other private information.
  • the information elements 1-8 may include the identifier, the first name, the last name, the gender, the e-mail address, the birth date, the address, and the other private information, respectively.
  • the user may desire to keep his/her last name, birth date, and address private.
  • the UE 408 encrypts information elements 3, 6, and 7.
  • the UE 408 also encrypts the information element 8, as that information is always encrypted.
  • the UE 408 then generates an encryption bitmap indicating that information elements 2, 4, and 5 are unencrypted and information elements 3, 6, and 7 are encrypted.
  • the UE 408 forms an expression 410 to include the encrypted/unencrypted information elements and the encryption bitmap.
  • the UE 408 broadcasts the expression 410.
  • FIG. 6 is a flow chart 600 of a second method of wireless communication.
  • the method may be performed by a UE.
  • the UE receives a message including a plurality of message sets and an encryption bitmap.
  • the encryption bitmap indicates an encrypted subset of the message sets and a remaining unencrypted subset of the message sets.
  • the UE decrypts the encrypted subset of the message sets.
  • the encryption bitmap may include a plurality of bits. Each of the bits may correspond to a different one of the message sets.
  • the encryption bitmap may include n bits for n message sets of m message sets, where m > n. [0031] For example, referring to FIG.
  • the UE 412 receives the expression 410 including the information elements 1-8 and the encryption bitmap.
  • the encryption bitmap indicates an encrypted subset of the information elements (e.g., information elements 3, 6, and 7) and a remaining unencrypted subset of the information elements (e.g., information elements 2, 4, and 5).
  • the UE 412 decrypts the encrypted subset of the information elements.
  • FIG. 7 is a conceptual data flow diagram 700 illustrating the data flow between different modules/means/components in an exemplary apparatus 702.
  • the apparatus may be a UE.
  • the apparatus may include an expression receiving module 710 that is configured to receive an expression/message including a plurality of information elements / message sets and an encryption bitmap.
  • the encryption bitmap indicates an encrypted subset of the information elements / message sets and a remaining unencrypted subset of the information elements / message sets.
  • the apparatus may further include an encryption/decryption module 712 that is configured to decrypt the encrypted subset of the information elements / message sets.
  • the apparatus may further include an expression generation module 714 that is configured to generate an expression/message including a plurality of information elements / message sets.
  • the expression generation module 714 provides at least a subset of the information elements / message sets to the encryption/decryption module 712, which is configured to encrypt the subset of the information elements / message sets.
  • the expression generation module 714 is configured to generate an encryption bitmap indicating the encrypted subset of the information elements / message sets and a remaining unencrypted subset of the information elements / message sets.
  • the expression generation module 714 is configured to provide the generated expression to an expression transmission module 716, which is configured to broadcast the encryption bitmap and the expression/message including the encrypted subset of the information elements / message sets and the remaining unencrypted subset of the information elements / message sets.
  • the apparatus may include additional modules that perform each of the steps of the algorithm in the aforementioned flow charts of FIGs. 5 and 6. As such, each step in the aforementioned flow charts of FIGs. 5 and 6 may be performed by a module and the apparatus may include one or more of those modules.
  • the modules may be one or more hardware components specifically configured to carry out the stated processes/algorithm, implemented by a processor configured to perform the stated processes/algorithm, stored within a computer-readable medium for implementation by a processor, or some combination thereof.
  • FIG. 8 is a diagram 800 illustrating an example of a hardware implementation for an apparatus 702' employing a processing system 814.
  • the processing system 814 may be implemented with a bus architecture, represented generally by the bus 824.
  • the bus 824 may include any number of interconnecting buses and bridges depending on the specific application of the processing system 814 and the overall design constraints.
  • the bus 824 links together various circuits including one or more processors and/or hardware modules, represented by the processor 804, the modules 710, 712, 714, 716, and the computer-readable medium 806.
  • the bus 824 may also link various other circuits such as timing sources, peripherals, voltage regulators, and power management circuits, which are well known in the art, and therefore, will not be described any further.
  • the processing system 814 may be coupled to a transceiver 810.
  • the transceiver 810 is coupled to one or more antennas 820.
  • the transceiver 810 provides a means for communicating with various other apparatus over a transmission medium.
  • the processing system 814 includes a processor 804 coupled to a computer-readable medium 806.
  • the processor 804 is responsible for general processing, including the execution of software stored on the computer-readable medium 806.
  • the software when executed by the processor 804, causes the processing system 814 to perform the various functions described supra for any particular apparatus.
  • the computer-readable medium 806 may also be used for storing data that is manipulated by the processor 804 when executing software.
  • the processing system further includes at least one of the modules 710, 712, 714, 716.
  • the modules may be software modules running in the processor 804, resident/stored in the computer readable medium 806, one or more hardware modules coupled to the processor 804, or some combination thereof.
  • the apparatus 702/702' for wireless communication includes means for generating a message including a plurality of message sets.
  • the apparatus further includes means for encrypting a subset of the message sets.
  • the apparatus further includes means for generating an encryption bitmap indicating the encrypted subset of the message sets and a remaining unencrypted subset of the message sets.
  • the apparatus further includes means for broadcasting the encryption bitmap and the message including the encrypted subset of the message sets and the remaining unencrypted subset of the message sets.
  • the aforementioned means may be one or more of the aforementioned modules of the apparatus 702 and/or the processing system 814 of the apparatus 702' configured to perform the functions recited by the aforementioned means.
  • the apparatus 702/702' for wireless communication includes means for receiving a message including a plurality of message sets and an encryption bitmap.
  • the encryption bitmap indicates an encrypted subset of the message sets and a remaining unencrypted subset of the message sets.
  • the apparatus further includes means for decrypting the encrypted subset of the message sets.
  • the aforementioned means may be one or more of the aforementioned modules of the apparatus 702 and/or the processing system 814 of the apparatus 702' configured to perform the functions recited by the aforementioned means.

Abstract

A method, an apparatus, and a computer program product for wireless communication are provided. In a first configuration, the apparatus generates a message including a plurality of message sets, encrypts a subset of the message sets, generates an encryption bitmap indicating the encrypted subset of the message sets and a remaining unencrypted subset of the message sets, and broadcasts the encryption bitmap and the message including the encrypted subset of the message sets and the remaining unencrypted subset of the message sets. In a second configuration, the apparatus receives a message including a plurality of message sets and an encryption bitmap. The encryption bitmap indicates an encrypted subset of the message sets and a remaining unencrypted subset of the message sets. In addition, the apparatus decrypts the encrypted subset of the message sets.

Description

ENCRYPTION BITMAP FOR A DEVICE-TO-DEVICE EXPRESSION
BACKGROUND
Field
[0001] The present disclosure relates generally to communication systems, and more particularly, to an encryption bitmap for a device-to-device expression.
Background
[0002] Wireless communication systems are widely deployed to provide various telecommunication services such as telephony, video, data, messaging, and broadcasts. Typical wireless communication systems may employ multiple-access technologies capable of supporting communication with multiple users by sharing available system resources (e.g., bandwidth, transmit power). Examples of such multiple-access technologies include code division multiple access (CDMA) systems, time division multiple access (TDMA) systems, frequency division multiple access (FDMA) systems, orthogonal frequency division multiple access (OFDMA) systems, single-carrier frequency division multiple access (SC-FDMA) systems, and time division synchronous code division multiple access (TD-SCDMA) systems.
[0003] These multiple access technologies have been adopted in various telecommunication standards to provide a common protocol that enables different wireless devices to communicate on a municipal, national, regional, and even global level. An example of a telecommunication standard is Long Term Evolution (LTE). LTE is a set of enhancements to the Universal Mobile Telecommunications System (UMTS) mobile standard promulgated by Third Generation Partnership Project (3GPP). LTE is designed to better support mobile broadband Internet access by improving spectral efficiency, lower costs, improve services, make use of new spectrum, and better integrate with other open standards using OFDMA on the downlink (DL), SC-FDMA on the uplink (UL), and multiple-input multiple-output (MIMO) antenna technology. LTE may support direct device-to-device communication. As the demand for device-to-device communication increases, there exists a need for methods/apparatuses for supporting device-to-device communication within LTE. SUMMARY
[0004] In an aspect of the disclosure, a method, a computer program product, and an apparatus are provided. The apparatus generates a message including a plurality of message sets. In addition, the apparatus encrypts a subset of the message sets. In addition, the apparatus generates an encryption bitmap indicating the encrypted subset of the message sets and a remaining unencrypted subset of the message sets. Furthermore, the apparatus broadcasts the encryption bitmap and the message including the encrypted subset of the message sets and the remaining unencrypted subset of the message sets.
[0005] In an aspect of the disclosure, a method, a computer program product, and an apparatus are provided. The apparatus receives a message including a plurality of message sets and an encryption bitmap. The encryption bitmap indicates an encrypted subset of the message sets and a remaining unencrypted subset of the message sets. In addition, the apparatus decrypts the encrypted subset of the message sets.
BRIEF DESCRIPTION OF THE DRAWINGS
[0006] FIG. 1 is a diagram illustrating an example of a network architecture.
[0007] FIG. 2 is a diagram illustrating an example of an access network.
[0008] FIG. 3 is a diagram illustrating a device-to-device communications network.
[0009] FIG. 4 is a diagram for illustrating an exemplary method.
[0010] FIG. 5 is a flow chart of a first method of wireless communication.
[0011] FIG. 6 is a flow chart of a second method of wireless communication.
[0012] FIG. 7 is a conceptual data flow diagram illustrating the data flow between different modules/means/components in an exemplary apparatus.
FIG. 8 is a diagram illustrating an example of a hardware implementation for apparatus employing a processing system.
DETAILED DESCRIPTION
[0014] The detailed description set forth below in connection with the appended drawings is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. The detailed description includes specific details for the purpose of providing a thorough understanding of various concepts. However, it will be apparent to those skilled in the art that these concepts may be practiced without these specific details. In some instances, well known structures and components are shown in block diagram form in order to avoid obscuring such concepts.
[0015] Several aspects of telecommunication systems will now be presented with reference to various apparatus and methods. These apparatus and methods will be described in the following detailed description and illustrated in the accompanying drawings by various blocks, modules, components, circuits, steps, processes, algorithms, etc. (collectively referred to as "elements"). These elements may be implemented using electronic hardware, computer software, or any combination thereof. Whether such elements are implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system.
[0016] By way of example, an element, or any portion of an element, or any combination of elements may be implemented with a "processing system" that includes one or more processors. Examples of processors include microprocessors, microcontrollers, digital signal processors (DSPs), field programmable gate arrays (FPGAs), programmable logic devices (PLDs), state machines, gated logic, discrete hardware circuits, and other suitable hardware configured to perform the various functionality described throughout this disclosure. One or more processors in the processing system may execute software. Software shall be construed broadly to mean instructions, instruction sets, code, code segments, program code, programs, subprograms, software modules, applications, software applications, software packages, routines, subroutines, objects, executables, threads of execution, procedures, functions, etc., whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise.
[0017] Accordingly, in one or more exemplary embodiments, the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or encoded as one or more instructions or code on a computer-readable medium. Computer- readable media includes computer storage media. Storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Disk and disc, as used herein, includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and Blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
[0018] FIG. 1 is a diagram illustrating an LTE network architecture 100. The LTE network architecture 100 may be referred to as an Evolved Packet System (EPS) 100. The EPS 100 may include one or more user equipment (UE) 102, an Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) 104, an Evolved Packet Core (EPC) 110, a Home Subscriber Server (HSS) 120, and an Operator's IP Services 122. The EPS can interconnect with other access networks, but for simplicity those entities/interfaces are not shown. As shown, the EPS provides packet-switched services, however, as those skilled in the art will readily appreciate, the various concepts presented throughout this disclosure may be extended to networks providing circuit-switched services.
[0019] The E-UTRAN includes the evolved Node B (eNB) 106 and other eNBs 108.
The eNB 106 provides user and control planes protocol terminations toward the UE 102. The eNB 106 may be connected to the other eNBs 108 via a backhaul (e.g., an X2 interface). The eNB 106 may also be referred to as a base station, a base transceiver station, a radio base station, a radio transceiver, a transceiver function, a basic service set (BSS), an extended service set (ESS), or some other suitable terminology. The eNB 106 provides an access point to the EPC 110 for a UE 102. Examples of UEs 102 include a cellular phone, a smart phone, a session initiation protocol (SIP) phone, a laptop, a personal digital assistant (PDA), a satellite radio, a global positioning system, a multimedia device, a video device, a digital audio player (e.g., MP3 player), a camera, a game console, or any other similar functioning device. The UE 102 may also be referred to by those skilled in the art as a mobile station, a subscriber station, a mobile unit, a subscriber unit, a wireless unit, a remote unit, a mobile device, a wireless device, a wireless communications device, a remote device, a mobile subscriber station, an access terminal, a mobile terminal, a wireless terminal, a remote terminal, a handset, a user agent, a mobile client, a client, or some other suitable terminology. [0020] The eNB 106 is connected by an SI interface to the EPC 110. The EPC 110 includes a Mobility Management Entity (MME) 112, other MMEs 114, a Serving Gateway 116, and a Packet Data Network (PDN) Gateway 118. The MME 112 is the control node that processes the signaling between the UE 102 and the EPC 110. Generally, the MME 112 provides bearer and connection management. All user IP packets are transferred through the Serving Gateway 116, which itself is connected to the PDN Gateway 118. The PDN Gateway 118 provides UE IP address allocation as well as other functions. The PDN Gateway 118 is connected to the Operator's IP Services 122. The Operator's IP Services 122 may include the Internet, the Intranet, an IP Multimedia Subsystem (IMS), and a PS Streaming Service (PSS).
[0021] FIG. 2 is a diagram illustrating an example of an access network 200 in an LTE network architecture. In this example, the access network 200 is divided into a number of cellular regions (cells) 202. One or more lower power class eNBs 208 may have cellular regions 210 that overlap with one or more of the cells 202. The lower power class eNB 208 may be a femto cell (e.g., home eNB (HeNB)), pico cell, micro cell, or remote radio head (RRH). The macro eNBs 204 are each assigned to a respective cell 202 and are configured to provide an access point to the EPC 110 for all the UEs 206, 212 in the cells 202. Some of the UEs 212 may be in device-to- device communication. There is no centralized controller in this example of an access network 200, but a centralized controller may be used in alternative configurations. The eNBs 204 are responsible for all radio related functions including radio bearer control, admission control, mobility control, scheduling, security, and connectivity to the serving gateway 116.
[0022] The modulation and multiple access scheme employed by the access network
200 may vary depending on the particular telecommunications standard being deployed. In LTE applications, OFDM is used on the DL and SC-FDMA is used on the UL to support both frequency division duplexing (FDD) and time division duplexing (TDD). As those skilled in the art will readily appreciate from the detailed description to follow, the various concepts presented herein are well suited for LTE applications. However, these concepts may be readily extended to other telecommunication standards employing other modulation and multiple access techniques. By way of example, these concepts may be extended to Evolution-Data Optimized (EV-DO) or Ultra Mobile Broadband (UMB). EV-DO and UMB are air interface standards promulgated by the 3rd Generation Partnership Project 2 (3GPP2) as part of the CDMA2000 family of standards and employs CDMA to provide broadband Internet access to mobile stations. These concepts may also be extended to Universal Terrestrial Radio Access (UTRA) employing Wideband-CDMA (W- CDMA) and other variants of CDMA, such as TD-SCDMA; Global System for Mobile Communications (GSM) employing TDMA; and Evolved UTRA (E-UTRA), IEEE 802.1 1 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, and Flash-OFDM employing OFDMA. UTRA, E-UTRA, UMTS, LTE and GSM are described in documents from the 3 GPP organization. CDMA2000 and UMB are described in documents from the 3GPP2 organization. The actual wireless communication standard and the multiple access technology employed will depend on the specific application and the overall design constraints imposed on the system.
[0023] FIG. 3 is a diagram of a device-to-device communications system 300. The device-to-device communications system 300 includes a plurality of UEs 304, 306, 308, 310. The device-to-device communications system 300 may overlap with a cellular communications system, such as for example, a wireless wide area network (WW AN). Some of the UEs 304, 306, 308, 310 may communicate together in device-to-device communication using DL/UL WWAN spectrum, some may communicate with the base station 302, and some may do both. For example, as shown in FIG. 3, the UEs 308, 310 are in device-to-device communication and the UEs 304, 306 are in device-to-device communication. The UEs 304, 306 are also communicating with the base station 302.
[0024] The exemplary methods and apparatuses discussed infra are applicable to any of a variety of wireless device-to-device communications systems, such as for example, a wireless device-to-device communication system based on FlashLinQ, WiMedia, Bluetooth, ZigBee, or Wi-Fi based on the IEEE 802.1 1 standard. To simplify the discussion, the exemplary methods and apparatus are discussed within the context of LTE. However, one of ordinary skill in the art would understand that the exemplary methods and apparatuses are applicable more generally to a variety of other wireless device-to-device communication systems.
[0025] UEs may periodically broadcast expressions to advertise services and/or available applications; provide contact, location, or identify information; and/or provide other information to other UEs. A user of the UEs may desire to keep portions of broadcasted expressions private while allowing other portions of the broadcasted expressions to be public. As such, methods are needed for facilitating decrypting broadcast expressions that include both unencrypted and encrypted portions.
[0026] FIG. 4 is a diagram 400 for illustrating an exemplary method. The UE 408 generates 406 an expression. The expression includes a plurality of information elements and an encryption bitmap. Each information element may be referred to as a message set. The information elements are either encrypted or unencrypted. Some of the information elements may never by encrypted, such as for example, information element 1. Some of the information elements may be encrypted or unencrypted, such as for example, the information elements 2-7. Some of the information elements may always be encrypted, such as for example, information element 8. The encryption bitmap includes a plurality of bits for indicating which of the information elements are encrypted/unencrypted. The encryption bitmap may indicate that an information element is encrypted by setting a bit corresponding to the information element to a "1" and indicate that an information element is unencrypted by setting the bit corresponding to the information element to a "0." Each of the bits may correspond to a different one of the information elements. However, in one configuration, a particular bit may correspond to more than one information element, and therefore each of the bits may correspond to a different subset of information elements. The encryption bitmap may only include bits for information elements that may be encrypted/unencrypted. As such, the encryption bitmap may not include bits for information elements that are always unencrypted (e.g., information element 1) or always encrypted (e.g., information element 8).
[0027] After generating an expression including a plurality of unencrypted and/or encrypted information elements and the encryption bitmap, the UE 408 broadcasts the expression 410. The UE 412 receives the broadcasted expression 410. From the received expression 410, the UE 412 obtains the information elements and the encryption bitmap. The UE 412 may provide information in the unencrypted information elements to a user of the UE 412. If the UE 412 has a security key and/or knows a security algorithm for decrypting encrypted information elements, the UE 412 may decrypt the information elements that are indicated as being encrypted in the encryption bitmap. If the UE 412 is able to decrypt the encrypted information elements, the UE 412 may provide the decrypted information in the encrypted information element to the user of the UE 412. [0028] FIG. 5 is a flow chart 500 of a first method of wireless communication. The method may be performed by a UE. At step 502, the UE generates a message including a plurality of message sets. At step 504, the UE encrypts a subset of the message sets. At step 506, the UE generates an encryption bitmap indicating the encrypted subset of the message sets and a remaining unencrypted subset of the message sets. At step 508, the UE broadcasts the encryption bitmap and the message including the encrypted subset of the message sets and the remaining unencrypted subset of the message sets. As discussed supra, the encryption bitmap may include a plurality of bits. Each of the bits may correspond to a different one of the message sets. Generally, the encryption bitmap may include n bits for n message sets of m message sets, where m > n.
[0029] For example, referring to FIG. 4, the UE 408 may generate a message including an identifier, the first name of a user of the UE 408, the last name of the user, a gender of the user, an e-mail address of the user, a birth date of the user, an address of the user, and other private information. The information elements 1-8 may include the identifier, the first name, the last name, the gender, the e-mail address, the birth date, the address, and the other private information, respectively. The user may desire to keep his/her last name, birth date, and address private. As such, the UE 408 encrypts information elements 3, 6, and 7. The UE 408 also encrypts the information element 8, as that information is always encrypted. The UE 408 then generates an encryption bitmap indicating that information elements 2, 4, and 5 are unencrypted and information elements 3, 6, and 7 are encrypted. The UE 408 forms an expression 410 to include the encrypted/unencrypted information elements and the encryption bitmap. The encryption bitmap includes 6 bits for 6 message sets of 8 message sets (n=6, m=8). The UE 408 broadcasts the expression 410.
[0030] FIG. 6 is a flow chart 600 of a second method of wireless communication. The method may be performed by a UE. At step 602, the UE receives a message including a plurality of message sets and an encryption bitmap. The encryption bitmap indicates an encrypted subset of the message sets and a remaining unencrypted subset of the message sets. At step 604, the UE decrypts the encrypted subset of the message sets. The encryption bitmap may include a plurality of bits. Each of the bits may correspond to a different one of the message sets. The encryption bitmap may include n bits for n message sets of m message sets, where m > n. [0031] For example, referring to FIG. 4, the UE 412 receives the expression 410 including the information elements 1-8 and the encryption bitmap. The encryption bitmap indicates an encrypted subset of the information elements (e.g., information elements 3, 6, and 7) and a remaining unencrypted subset of the information elements (e.g., information elements 2, 4, and 5). The UE 412 decrypts the encrypted subset of the information elements.
[0032] FIG. 7 is a conceptual data flow diagram 700 illustrating the data flow between different modules/means/components in an exemplary apparatus 702. The apparatus may be a UE. The apparatus may include an expression receiving module 710 that is configured to receive an expression/message including a plurality of information elements / message sets and an encryption bitmap. The encryption bitmap indicates an encrypted subset of the information elements / message sets and a remaining unencrypted subset of the information elements / message sets. The apparatus may further include an encryption/decryption module 712 that is configured to decrypt the encrypted subset of the information elements / message sets. The apparatus may further include an expression generation module 714 that is configured to generate an expression/message including a plurality of information elements / message sets. The expression generation module 714 provides at least a subset of the information elements / message sets to the encryption/decryption module 712, which is configured to encrypt the subset of the information elements / message sets. The expression generation module 714 is configured to generate an encryption bitmap indicating the encrypted subset of the information elements / message sets and a remaining unencrypted subset of the information elements / message sets. The expression generation module 714 is configured to provide the generated expression to an expression transmission module 716, which is configured to broadcast the encryption bitmap and the expression/message including the encrypted subset of the information elements / message sets and the remaining unencrypted subset of the information elements / message sets.
[0033] The apparatus may include additional modules that perform each of the steps of the algorithm in the aforementioned flow charts of FIGs. 5 and 6. As such, each step in the aforementioned flow charts of FIGs. 5 and 6 may be performed by a module and the apparatus may include one or more of those modules. The modules may be one or more hardware components specifically configured to carry out the stated processes/algorithm, implemented by a processor configured to perform the stated processes/algorithm, stored within a computer-readable medium for implementation by a processor, or some combination thereof.
[0034] FIG. 8 is a diagram 800 illustrating an example of a hardware implementation for an apparatus 702' employing a processing system 814. The processing system 814 may be implemented with a bus architecture, represented generally by the bus 824. The bus 824 may include any number of interconnecting buses and bridges depending on the specific application of the processing system 814 and the overall design constraints. The bus 824 links together various circuits including one or more processors and/or hardware modules, represented by the processor 804, the modules 710, 712, 714, 716, and the computer-readable medium 806. The bus 824 may also link various other circuits such as timing sources, peripherals, voltage regulators, and power management circuits, which are well known in the art, and therefore, will not be described any further.
[0035] The processing system 814 may be coupled to a transceiver 810. The transceiver 810 is coupled to one or more antennas 820. The transceiver 810 provides a means for communicating with various other apparatus over a transmission medium. The processing system 814 includes a processor 804 coupled to a computer-readable medium 806. The processor 804 is responsible for general processing, including the execution of software stored on the computer-readable medium 806. The software, when executed by the processor 804, causes the processing system 814 to perform the various functions described supra for any particular apparatus. The computer-readable medium 806 may also be used for storing data that is manipulated by the processor 804 when executing software. The processing system further includes at least one of the modules 710, 712, 714, 716. The modules may be software modules running in the processor 804, resident/stored in the computer readable medium 806, one or more hardware modules coupled to the processor 804, or some combination thereof.
[0036] In a first configuration, the apparatus 702/702' for wireless communication includes means for generating a message including a plurality of message sets. The apparatus further includes means for encrypting a subset of the message sets. The apparatus further includes means for generating an encryption bitmap indicating the encrypted subset of the message sets and a remaining unencrypted subset of the message sets. The apparatus further includes means for broadcasting the encryption bitmap and the message including the encrypted subset of the message sets and the remaining unencrypted subset of the message sets. The aforementioned means may be one or more of the aforementioned modules of the apparatus 702 and/or the processing system 814 of the apparatus 702' configured to perform the functions recited by the aforementioned means.
[0037] In a second configuration, the apparatus 702/702' for wireless communication includes means for receiving a message including a plurality of message sets and an encryption bitmap. The encryption bitmap indicates an encrypted subset of the message sets and a remaining unencrypted subset of the message sets. The apparatus further includes means for decrypting the encrypted subset of the message sets. The aforementioned means may be one or more of the aforementioned modules of the apparatus 702 and/or the processing system 814 of the apparatus 702' configured to perform the functions recited by the aforementioned means.
[0038] It is understood that the specific order or hierarchy of steps in the processes disclosed is an illustration of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged. Further, some steps may be combined or omitted. The accompanying method claims present elements of the various steps in a sample order, and are not meant to be limited to the specific order or hierarchy presented.
[0039] The previous description is provided to enable any person skilled in the art to practice the various aspects described herein. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects. Thus, the claims are not intended to be limited to the aspects shown herein, but is to be accorded the full scope consistent with the language claims, wherein reference to an element in the singular is not intended to mean "one and only one" unless specifically so stated, but rather "one or more." Unless specifically stated otherwise, the term "some" refers to one or more. All structural and functional equivalents to the elements of the various aspects described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the claims. Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the claims. No claim element is to be construed as a means plus function unless the element is expressly recited using the phrase "means for."

Claims

WHAT IS CLAIMED IS: CLAIMS
1. A method of wireless communication, comprising:
generating a message including a plurality of message sets;
encrypting a subset of the message sets;
generating an encryption bitmap indicating the encrypted subset of the message sets and a remaining unencrypted subset of the message sets; and
broadcasting the encryption bitmap and the message including the encrypted subset of the message sets and the remaining unencrypted subset of the message sets.
2. The method of claim 1, wherein the encryption bitmap includes a plurality of bits, each of the bits corresponding to a different one of the message sets.
3. The method of claim 2, wherein the encryption bitmap includes n bits for n message sets of m message sets, m being greater than or equal to n.
4. A method of wireless communication, comprising:
receiving a message including a plurality of message sets and an encryption bitmap, the encryption bitmap indicating an encrypted subset of the message sets and a remaining unencrypted subset of the message sets; and
decrypting the encrypted subset of the message sets.
5. The method of claim 4, wherein the encryption bitmap includes a plurality of bits, each of the bits corresponding to a different one of the message sets.
6. The method of claim 5, wherein the encryption bitmap includes n bits for n message sets of m message sets, m being greater than or equal to n.
7. An apparatus for wireless communication, comprising:
means for generating a message including a plurality of message sets;
means for encrypting a subset of the message sets;
means for generating an encryption bitmap indicating the encrypted subset of the message sets and a remaining unencrypted subset of the message sets; and means for broadcasting the encryption bitmap and the message including the encrypted subset of the message sets and the remaining unencrypted subset of the message sets.
8. The apparatus of claim 7, wherein the encryption bitmap includes a plurality of bits, each of the bits corresponding to a different one of the message sets.
9. The apparatus of claim 8, wherein the encryption bitmap includes n bits for n message sets of m message sets, m being greater than or equal to n.
10. An apparatus for wireless communication, comprising:
means for receiving a message including a plurality of message sets and an encryption bitmap, the encryption bitmap indicating an encrypted subset of the message sets and a remaining unencrypted subset of the message sets; and
means for decrypting the encrypted subset of the message sets.
11. The apparatus of claim 10, wherein the encryption bitmap includes a plurality of bits, each of the bits corresponding to a different one of the message sets.
12. The apparatus of claim 11, wherein the encryption bitmap includes n bits for n message sets of m message sets, m being greater than or equal to n.
13. An apparatus for wireless communication, comprising:
a processing system configured to:
generate a message including a plurality of message sets;
encrypt a subset of the message sets;
generate an encryption bitmap indicating the encrypted subset of the message sets and a remaining unencrypted subset of the message sets; and
broadcast the encryption bitmap and the message including the encrypted subset of the message sets and the remaining unencrypted subset of the message sets.
14. The apparatus of claim 13, wherein the encryption bitmap includes a plurality of bits, each of the bits corresponding to a different one of the message sets.
15. The apparatus of claim 14, wherein the encryption bitmap includes n bits for n message sets of m message sets, m being greater than or equal to n.
16. An apparatus for wireless communication, comprising:
a processing system configured to:
receive a message including a plurality of message sets and an encryption bitmap, the encryption bitmap indicating an encrypted subset of the message sets and a remaining unencrypted subset of the message sets; and
decrypt the encrypted subset of the message sets.
17. The apparatus of claim 16, wherein the encryption bitmap includes a plurality of bits, each of the bits corresponding to a different one of the message sets.
18. The apparatus of claim 17, wherein the encryption bitmap includes n bits for n message sets of m message sets, m being greater than or equal to n.
19. A computer program product, comprising:
a computer-readable medium comprising code for:
generating a message including a plurality of message sets;
encrypting a subset of the message sets;
generating an encryption bitmap indicating the encrypted subset of the message sets and a remaining unencrypted subset of the message sets; and
broadcasting the encryption bitmap and the message including the encrypted subset of the message sets and the remaining unencrypted subset of the message sets.
20. The computer-program product of claim 19, wherein the encryption bitmap includes a plurality of bits, each of the bits corresponding to a different one of the message sets.
21. The computer-program product of claim 20, wherein the encryption bitmap includes n bits for n message sets of m message sets, m being greater than or equal to n.
22. A computer program product, comprising:
a computer-readable medium comprising code for: receiving a message including a plurality of message sets and an encryption bitmap, the encryption bitmap indicating an encrypted subset of the message sets and a remaining unencrypted subset of the message sets; and
decrypting the encrypted subset of the message sets.
23. The computer program product of claim 22, wherein the encryption bitmap includes a plurality of bits, each of the bits corresponding to a different one of the message sets.
24. The computer program product of claim 23, wherein the encryption bitmap includes n bits for n message sets of m message sets, m being greater than or equal to n.
PCT/CN2012/076822 2012-06-13 2012-06-13 Encryption bitmap for a device-to-device expression WO2013185303A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2012/076822 WO2013185303A1 (en) 2012-06-13 2012-06-13 Encryption bitmap for a device-to-device expression

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2012/076822 WO2013185303A1 (en) 2012-06-13 2012-06-13 Encryption bitmap for a device-to-device expression

Publications (1)

Publication Number Publication Date
WO2013185303A1 true WO2013185303A1 (en) 2013-12-19

Family

ID=49757421

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/076822 WO2013185303A1 (en) 2012-06-13 2012-06-13 Encryption bitmap for a device-to-device expression

Country Status (1)

Country Link
WO (1) WO2013185303A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021169121A1 (en) * 2020-02-26 2021-09-02 平安科技(深圳)有限公司 Method for switching between data storage schemes, device, and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101059957A (en) * 2007-05-24 2007-10-24 华中科技大学 An audio coding selective cryptographic method
US20100115289A1 (en) * 2008-11-06 2010-05-06 Samsung Electronics Co., Ltd. Method and apparatus for encrypting user data
CN102012993A (en) * 2010-11-29 2011-04-13 北京卓微天成科技咨询有限公司 Methods and devices for selectively encrypting and decrypting data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101059957A (en) * 2007-05-24 2007-10-24 华中科技大学 An audio coding selective cryptographic method
US20100115289A1 (en) * 2008-11-06 2010-05-06 Samsung Electronics Co., Ltd. Method and apparatus for encrypting user data
CN102012993A (en) * 2010-11-29 2011-04-13 北京卓微天成科技咨询有限公司 Methods and devices for selectively encrypting and decrypting data

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021169121A1 (en) * 2020-02-26 2021-09-02 平安科技(深圳)有限公司 Method for switching between data storage schemes, device, and storage medium

Similar Documents

Publication Publication Date Title
US20210029596A1 (en) Communication system
JP6686043B2 (en) Method and apparatus for securing a configured proximity service code for restricted discovery
JP6242947B2 (en) Method and device for secure MBMS reception reporting
US11039372B2 (en) Non-access stratum transport for non-mobility management messages
EP2909992B1 (en) Methods and apparatus for providing network-assisted key agreement for p2p communications
CN109691154B (en) On-demand network function re-authentication based on key refresh
TWI710271B (en) Frequency determination for device-to-device transmissions and receptions
EP2910043B1 (en) Methods and apparatus for providing additional security for communication of sensitive information
US8639274B2 (en) Method and apparatus for enabling common channel communications of SMS
US11452067B2 (en) Secure paging for service prioritization
US8787908B2 (en) Efficient femto discovery protocol using macro synchronization
TWI709350B (en) Multi-radio access technology synchronization signal
US20130259231A1 (en) Methods and apparatus for base station assisted peer discovery through aggregation of expressions
WO2013185303A1 (en) Encryption bitmap for a device-to-device expression
EP2929667B1 (en) Methods and apparatus for providing private expression protection against impersonation risks
AU2022327451A1 (en) Secure communication method and communication apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12879049

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12879049

Country of ref document: EP

Kind code of ref document: A1