WO2023175461A1 - Establishing an application session corresponding to a pin element - Google Patents

Establishing an application session corresponding to a pin element Download PDF

Info

Publication number
WO2023175461A1
WO2023175461A1 PCT/IB2023/052314 IB2023052314W WO2023175461A1 WO 2023175461 A1 WO2023175461 A1 WO 2023175461A1 IB 2023052314 W IB2023052314 W IB 2023052314W WO 2023175461 A1 WO2023175461 A1 WO 2023175461A1
Authority
WO
WIPO (PCT)
Prior art keywords
pin
pin element
processor
request
network device
Prior art date
Application number
PCT/IB2023/052314
Other languages
French (fr)
Inventor
Andreas Kunz
Sheeba Backia Mary BASKARAN
Original Assignee
Lenovo (Singapore) Pte. Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo (Singapore) Pte. Ltd. filed Critical Lenovo (Singapore) Pte. Ltd.
Publication of WO2023175461A1 publication Critical patent/WO2023175461A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the subject matter disclosed herein relates generally to wireless communications and more particularly relates to establishing an application session corresponding to a personal internet of things network (“PIN”) element.
  • PIN personal internet of things network
  • PIN elements may be used. In such networks, communication between PIN elements may be limited.
  • Methods for establishing an application session corresponding to a PIN element are disclosed. Apparatuses and systems also perform the functions of the methods.
  • One embodiment of a method includes performing, at a first network device, a local authentication and registration of PIN elements with preconfigured credentials.
  • the method includes transmitting, to a PIN application function (“AF”), a first request message including an application session establishment request.
  • the method includes transmitting, from the PIN AF, a first response message including an application session establishment response.
  • AF PIN application function
  • One apparatus for establishing an application session corresponding to a PIN element includes a first network device.
  • the apparatus includes a processor.
  • the apparatus includes a transceiver coupled to the processor.
  • the processor performs a local authentication and registration of PIN elements with preconfigured credentials.
  • the transceiver transmits, to a PIN AF, a first request message including an application session establishment request.
  • the transceiver transmits, from the PIN AF, a first response message including an application session establishment response.
  • Another embodiment of a method for establishing an application session corresponding to a PIN element includes receiving, at a PIN AF from a first network device, a first request message including an application session establishment request. In some embodiments, the method includes transmitting, to a second network device, a second request message including a Naanf_AKMA_ApplicationKey_Get request. In certain embodiments, the method includes receiving, from the second network device, a first response message including a Naanf_AKMA_ApplicationKey_Get response. The first response message includes a list of managed PIN element identifiers (“IDs”) and their corresponding binding policies. In various embodiments, the method includes transmitting, to the first network device, a second response message including an application session establishment response.
  • IDs managed PIN element identifiers
  • Another apparatus for establishing an application session corresponding to a PIN element includes a PIN AF.
  • the apparatus includes a processor.
  • the apparatus includes a transceiver coupled to the processor.
  • the transceiver receives, from a first network device, a first request message including an application session establishment request.
  • the transceiver transmits, to a second network device, a second request message including a Naanf_AKMA_ApplicationKey_Get request.
  • the transceiver receives, from the second network device, a first response message including a Naanf_AKMA_ApplicationKey_Get response.
  • the first response message includes a list of managed PIN element IDs and their corresponding binding policies.
  • the transceiver transmits, to the first network device, a second response message including an application session establishment response.
  • a further embodiment of a method for establishing an application session corresponding to a PIN element includes performing, at a PIN element, a local authentication and registration of the PIN element with preconfigured credentials.
  • the method includes sending a request to a first network device for sending data to a second device outside the local network.
  • a further apparatus for establishing an application session corresponding to a PIN element includes a PIN element.
  • the apparatus includes a transceiver.
  • the apparatus includes a processor coupled to the transceiver.
  • the transceiver performs a local authentication and registration of the PIN element with preconfigured credentials.
  • the transceiver sends a request to a first network device for sending data to a second device outside the local network.
  • Figure 1 is a schematic block diagram illustrating one embodiment of a wireless communication system for establishing an application session corresponding to a PIN element
  • Figure 2 is a schematic block diagram illustrating one embodiment of an apparatus that may be used for establishing an application session corresponding to a PIN element
  • Figure 3 is a schematic block diagram illustrating one embodiment of an apparatus that may be used for establishing an application session corresponding to a PIN element
  • Figure 4 is a schematic block diagram illustrating one embodiment of a system including PIN elements
  • FIG. 5 is a schematic block diagram illustrating one embodiment of a system for an authentication and key management for applications (“AKMA”) anchor function (“AAnF”) provisioning at primary authentication;
  • AKMA authentication and key management for applications
  • AAA anchor function
  • Figure 6 is a schematic block diagram illustrating one embodiment of a system for PIN AF provisioning at application session establishment
  • Figure 7 is a schematic block diagram illustrating one embodiment of a system for a PIN element binding policy update
  • Figure 8 is a schematic block diagram illustrating one embodiment of a system for binding PIN elements inside and outside a PIN;
  • Figure 9 is a flow chart diagram illustrating one embodiment of a method for establishing an application session corresponding to a PIN element.
  • Figure 10 is a flow chart diagram illustrating another embodiment of a method for establishing an application session corresponding to a PIN element.
  • Figure 11 is a flow chart diagram illustrating a further embodiment of a method for establishing an application session corresponding to a PIN element.
  • embodiments may be embodied as a system, apparatus, method, or program product. Accordingly, embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, embodiments may take the form of a program product embodied in one or more computer readable storage devices storing machine readable code, computer readable code, and/or program code, referred hereafter as code. The storage devices may be tangible, non-transitory, and/or non-transmission. The storage devices may not embody signals. In a certain embodiment, the storage devices only employ signals for accessing code.
  • modules may be implemented as a hardware circuit comprising custom very-large-scale integration (“VLSI”) circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components.
  • VLSI very-large-scale integration
  • a module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.
  • Modules may also be implemented in code and/or software for execution by various types of processors.
  • An identified module of code may, for instance, include one or more physical or logical blocks of executable code which may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may include disparate instructions stored in different locations which, when joined logically together, include the module and achieve the stated purpose for the module.
  • a module of code may be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices.
  • operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different computer readable storage devices.
  • the software portions are stored on one or more computer readable storage devices.
  • the computer readable medium may be a computer readable storage medium.
  • the computer readable storage medium may be a storage device storing the code.
  • the storage device may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, holographic, micromechanical, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
  • a storage device More specific examples (a non-exhaustive list) of the storage device would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (“RAM”), a read-only memory (“ROM”), an erasable programmable read-only memory (“EPROM” or Flash memory), a portable compact disc readonly memory (“CD-ROM”), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
  • a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
  • Code for carrying out operations for embodiments may be any number of lines and may be written in any combination of one or more programming languages including an object oriented programming language such as Python, Ruby, Java, Smalltalk, C++, or the like, and conventional procedural programming languages, such as the "C" programming language, or the like, and/or machine languages such as assembly languages.
  • the code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
  • the remote computer may be connected to the user's computer through any type of network, including a local area network (“LAN”) or a wide area network (“WAN”), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • LAN local area network
  • WAN wide area network
  • Internet Service Provider an Internet Service Provider
  • the code may also be stored in a storage device that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the storage device produce an article of manufacture including instructions which implement the function/act specified in the schematic flowchart diagrams and/or schematic block diagrams block or blocks.
  • the code may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the code which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • each block in the schematic flowchart diagrams and/or schematic block diagrams may represent a module, segment, or portion of code, which includes one or more executable instructions of the code for implementing the specified logical function(s).
  • Figure 1 depicts an embodiment of a wireless communication system 100 for establishing an application session corresponding to a PIN element.
  • the wireless communication system 100 includes remote units 102 and network units 104. Even though a specific number of remote units 102 and network units 104 are depicted in Figure 1, one of skill in the art will recognize that any number of remote units 102 and network units 104 may be included in the wireless communication system 100.
  • the remote units 102 may include computing devices, such as desktop computers, laptop computers, personal digital assistants (“PDAs”), tablet computers, smart phones, smart televisions (e.g., televisions connected to the Internet), set-top boxes, game consoles, security systems (including security cameras), vehicle on-board computers, network devices (e.g., routers, switches, modems), aerial vehicles, drones, or the like.
  • the remote units 102 include wearable devices, such as smart watches, fitness bands, optical head-mounted displays, or the like.
  • the remote units 102 may be referred to as subscriber units, mobiles, mobile stations, users, terminals, mobile terminals, fixed terminals, subscriber stations, UE, user terminals, a device, or by other terminology used in the art.
  • the remote units 102 may communicate directly with one or more of the network units 104 via uplink (“UL”) communication signals. In certain embodiments, the remote units 102 may communicate directly with other remote units 102 via sidelink communication.
  • UL uplink
  • the network units 104 may be distributed over a geographic region.
  • a network unit 104 may also be referred to and/or may include one or more of an access point, an access terminal, a base, a base station, a location server, a core network (“CN”), a radio network entity, a Node-B, an evolved node-B (“eNB”), a 5G node-B (“gNB”), a Home Node-B, a relay node, a device, a core network, an aerial server, a radio access node, an access point (“AP”), new radio (‘NR”), a network entity, an access and mobility management function (“AMF”), a unified data management (“UDM”), a unified data repository (“UDR”), a UDM/UDR, a policy control function (“PCF”), a radio access network (“RAN”), a network slice selection function (“NSSF”), an operations, administration, and management (“0AM”), a session management function (“SMF”), a radio access
  • the network units 104 are generally part of a radio access network that includes one or more controllers communicably coupled to one or more corresponding network units 104.
  • the radio access network is generally communicably coupled to one or more core networks, which may be coupled to other networks, like the Internet and public switched telephone networks, among other networks. These and other elements of radio access and core networks are not illustrated but are well known generally by those having ordinary skill in the art.
  • the wireless communication system 100 is compliant with NR protocols standardized in 3GPP, wherein the network unit 104 transmits using an orthogonal frequency division multiplexing (“OFDM”) modulation scheme on the downlink (“DL”) and the remote units 102 transmit on the UL using a single-carrier frequency division multiple access (“SC-FDMA”) scheme or an OFDM scheme. More generally, however, the wireless communication system 100 may implement some other open or proprietary communication protocol, for example, WiMAX, institute of electrical and electronics engineers (“IEEE”) 802.
  • GSM global system for mobile communications
  • GPRS general packet radio service
  • UMTS universal mobile telecommunications system
  • LTE long term evolution
  • CDMA2000 code division multiple access 2000
  • Bluetooth® ZigBee
  • Sigfoxx among other protocols.
  • the present disclosure is not intended to be limited to the implementation of any particular wireless communication system architecture or protocol.
  • the network units 104 may serve a number of remote units 102 within a serving area, for example, a cell or a cell sector via a wireless communication link.
  • the network units 104 transmit DL communication signals to serve the remote units 102 in the time, frequency, and/or spatial domain.
  • a network unit 104 may perform, at a first network device, a local authentication and registration of PIN elements with preconfigured credentials.
  • the network unit 104 may transmit, to a PIN AF, a first request message including an application session establishment request.
  • the network unit 104 may transmit, from the PIN AF, a first response message including an application session establishment response. Accordingly, the network unit 104 may be used for establishing an application session corresponding to a PIN element.
  • a network unit 104 may receive, at a PIN AF from a first network device, a first request message including an application session establishment request. In some embodiments, the network unit 104 may transmit, to a second network device, a second request message including a Naanf_AKMA_ApplicationKey_Get request. In certain embodiments, the network unit 104 may receive, from the second network device, a first response message including a Naanf_AKMA_ApplicationKey_Get response. The first response message includes a list of managed PIN element IDs and their corresponding binding policies. In various embodiments, the network unit 104 may transmit, to the first network device, a second response message including an application session establishment response. Accordingly, the network unit 104 may be used for establishing an application session corresponding to a PIN element.
  • a remote unit 102 and/or a network unit 104 may perform, at a PIN element, a local authentication and registration of the PIN element with preconfigured credentials.
  • the remote unit 102 and/or the network unit 104 may send a request to a first network device for sending data to a second device outside the local network. Accordingly, the remote unit 102 and/or the network unit 104 may be used for establishing an application session corresponding to a PIN element.
  • Figure 2 depicts one embodiment of an apparatus 200 that may be used for establishing an application session corresponding to a PIN element.
  • the apparatus 200 includes one embodiment of the remote unit 102.
  • the remote unit 102 may include a processor 202, a memory 204, an input device 206, a display 208, a transmitter 210, and a receiver 212.
  • the input device 206 and the display 208 are combined into a single device, such as a touchscreen.
  • the remote unit 102 may not include any input device 206 and/or display 208.
  • the remote unit 102 may include one or more of the processor 202, the memory 204, the transmitter 210, and the receiver 212, and may not include the input device 206 and/or the display 208.
  • the processor 202 may include any known controller capable of executing computer-readable instructions and/or capable of performing logical operations.
  • the processor 202 may be a microcontroller, a microprocessor, a central processing unit (“CPU”), a graphics processing unit (“GPU”), an auxiliary processing unit, a field programmable gate array (“FPGA”), or similar programmable controller.
  • the processor 202 executes instructions stored in the memory 204 to perform the methods and routines described herein.
  • the processor 202 is communicatively coupled to the memory 204, the input device 206, the display 208, the transmitter 210, and the receiver 212.
  • the memory 204 in one embodiment, is a computer readable storage medium.
  • the memory 204 includes volatile computer storage media.
  • the memory 204 may include a RAM, including dynamic RAM (“DRAM”), synchronous dynamic RAM (“SDRAM”), and/or static RAM (“SRAM”).
  • the memory 204 includes non-volatile computer storage media.
  • the memory 204 may include a hard disk drive, a flash memory, or any other suitable non-volatile computer storage device.
  • the memory 204 includes both volatile and non-volatile computer storage media.
  • the memory 204 also stores program code and related data, such as an operating system or other controller algorithms operating on the remote unit 102.
  • the input device 206 may include any known computer input device including a touch panel, a button, a keyboard, a stylus, a microphone, or the like.
  • the input device 206 may be integrated with the display 208, for example, as a touchscreen or similar touch-sensitive display.
  • the input device 206 includes a touchscreen such that text may be input using a virtual keyboard displayed on the touchscreen and/or by handwriting on the touchscreen.
  • the input device 206 includes two or more different devices, such as a keyboard and a touch panel.
  • the display 208 may include any known electronically controllable display or display device.
  • the display 208 may be designed to output visual, audible, and/or haptic signals.
  • the display 208 includes an electronic display capable of outputting visual data to a user.
  • the display 208 may include, but is not limited to, a liquid crystal display (“LCD”), a light emitting diode (“LED”) display, an organic light emitting diode (“OLED”) display, a projector, or similar display device capable of outputting images, text, or the like to a user.
  • the display 208 may include a wearable display such as a smart watch, smart glasses, a heads-up display, or the like.
  • the display 208 may be a component of a smart phone, a personal digital assistant, a television, a table computer, a notebook (laptop) computer, a personal computer, a vehicle dashboard, or the like.
  • the display 208 includes one or more speakers for producing sound.
  • the display 208 may produce an audible alert or notification (e.g., a beep or chime).
  • the display 208 includes one or more haptic devices for producing vibrations, motion, or other haptic feedback.
  • all or portions of the display 208 may be integrated with the input device 206.
  • the input device 206 and display 208 may form a touchscreen or similar touch-sensitive display.
  • the display 208 may be located near the input device 206.
  • the remote unit 102 may have any suitable number of transmitters 210 and receivers 212.
  • the transmitter 210 and the receiver 212 may be any suitable type of transmitters and receivers.
  • the transmitter 210 and the receiver 212 may be part of a transceiver.
  • the transceiver performs a local authentication and registration of the PIN element with preconfigured credentials. In some embodiments, the transceiver sends a request to a first network device for sending data to a second device outside the local network.
  • Figure 3 depicts one embodiment of an apparatus 300 that may be used for establishing an application session corresponding to a PIN element.
  • the apparatus 300 includes one embodiment of the network unit 104.
  • the network unit 104 may include a processor 302, a memory 304, an input device 306, a display 308, atransmitter 310, and a receiver 312.
  • the processor 302, the memory 304, the input device 306, the display 308, the transmitter 310, and the receiver 312 may be substantially similar to the processor 202, the memory 204, the input device 206, the display 208, the transmitter 210, and the receiver 212 of the remote unit 102, respectively.
  • the processor 302 performs a local authentication and registration of PIN elements with preconfigured credentials.
  • the transceiver transmits, to a PIN AF, a first request message including an application session establishment request.
  • the transceiver transmits, from the PIN AF, a first response message including an application session establishment response.
  • the transceiver receives, from a first network device, a first request message including an application session establishment request. In some embodiments, the transceiver transmits, to a second network device, a second request message including a Naanf_AKMA_ApplicationKey_Get request. In various embodiments, the transceiver receives, from the second network device, a first response message including a Naanf_AKMA_ApplicationKey_Get response. In certain embodiments, the first response message includes a list of managed PIN element IDs and their corresponding binding policies. In some embodiments, the transceiver transmits, to the first network device, a second response message including an application session establishment response.
  • the transceiver performs a local authentication and registration of the PIN element with preconfigured credentials. In some embodiments, the transceiver sends a request to a first network device for sending data to a second device outside the local network.
  • security may be used by a device for authentication, authorization, data protection, and registration to a mobile core network.
  • there may be security protection and access control that indicates 1) how a fifth generation system (“5GS”) supports secure protection for communications between personal internet of things (“loT”) network (“PIN”) elements (e.g., via a PIN element with gateway capabilities (“PEGC”) or via fifth generation core (“5GC”), or for communications between PIN elements and PEGC; and/or 2) gap analysis on how a 5GS supports mitigation of repeated and unauthorized attempts to access PIN elements (e.g., the from internet, or from other PIN elements via a PEGC).
  • PIN personal internet of things
  • PEGC PIN element with gateway capabilities
  • 5GC fifth generation core
  • the PIN elements may have 3GPP credentials but may also not have 3GPP credentials.
  • PIN elements may connect to a non-3GPP network.
  • a non-3GPP access network e.g., trusted, untrusted access
  • device capabilities e.g., devices with 3GPP credentials with non-access stratum (NAS) capabilities, without NAS capabilities, behind a residential gateway or direct connection to the non-3GPP access point (“AP”)).
  • NAS non-access stratum
  • there may be a direct communication e.g., an IP multimedia system (“IMS”) voice and/or video session
  • IMS IP multimedia system
  • devices that both have 3GPP credentials and are registered in a mobile network.
  • the PIN elements may not have 3GPP credentials for a registration to a mobile core network.
  • devices without 3GPP credentials are limited to a residential gateway and not to end user devices (e.g., PIN elements).
  • a local binding for a direct communication within a local personal network may be performed and a service request procedure for data access to a DN via a 5GC may be made.
  • FIG. 4 is a schematic block diagram illustrating one embodiment of a system 400 including PIN elements.
  • the system 400 includes a PIN element #A 402 (e.g., motion sensor) that communicates a trigger to a PIN element #B 404 (e.g., surveillance camera).
  • the PIN element #A 402 sends a motion detected (e.g., via locally encrypted commands) signal to a PIN element with management capabilities 406.
  • the PIN element #B 404 sends data to a PIN element with gateway capabilities 408.
  • the PIN element with management capabilities 406 provides a list of registered PIN elements to the PIN element with gateway capabilities 408.
  • the PIN element with management capabilities 406 provides an indication to turn a light switch (e.g., via locally encrypted commands) on to a PIN element #C 410 (e.g., light).
  • the PIN element with gateway capabilities 408 sends information to a 5GC 412, and the 5GC 412 sends information to a PIN element #D 414 (e.g., smartphone).
  • the PIN element with gateway capabilities 408 registers all the local PIN elements in the fifth generation (“5G”) core network (“CN”).
  • 5G fifth generation
  • CN fifth generation core network
  • PEMC PIN element with management capabilities
  • PEMC/PEGC PEGC/PEGC
  • a PEMC and a PEGC may be collocated as one function within a same entity or may be implemented as two separate functions.
  • the PEMC and/or the PEGC may be considered as a user equipment (“UE”) from the 5GC point of view with additional capabilities (e.g., registration of local PIN elements without 3GPP credentials to the 5GC).
  • UE user equipment
  • AF PIN application function
  • an AAnF is provided with a list of managed PIN element IDs and operator PIN policies for this PEMC/PEGC in addition to AKMA information.
  • FIG. 5 is a schematic block diagram illustrating one embodiment of a system 500 for AAnF provisioning at primary authentication.
  • the system 500 includes a PEMC/PEGC 502, an AMF 504, an AUSF 506, a UDM 508, and an AAnF 510.
  • Each of the communications in the system 500 may include one or more messages.
  • the AUSF 506 interacts with the UDM 508 to fetch authentication information such as subscription credentials (e.g., authentication and key agreement (“AKA”) authentication vectors) and an authentication method using a Nudm_UEAuthentication_Get request service operation (e.g., the message may include subscription permanent identifier (“SUPI”) and/or subscription concealed identifier (“SUCI”)).
  • subscription credentials e.g., authentication and key agreement (“AKA”) authentication vectors
  • AKA authentication and key agreement
  • Nudm_UEAuthentication_Get request service operation e.g., the message may include subscription permanent identifier (“SUPI”) and/or subscription concealed identifier (“SUCI”)).
  • SUPI subscription permanent identifier
  • SUCI subscription concealed identifier
  • the address of a PIN AF for binding PIN elements inside a PIN with those outside a PIN may be preconfigured in the PEMC/PEGC 502 or provisioned during primary authentication.
  • the UDM 508 may indicate to the AUSF 506 whether AKMA anchor keys need to be generated for the PEMC/PEGC 502. If an AKMA indicator (e.g., AKMA Ind) is included, the UDM 508 may include an RID of the PEMC/PEGC 502 as well as a list of managed PIN element IDs and operator PIN policies for binding PIN elements. An authentication vector (“AV”) may also be included in the response.
  • AKMA indicator e.g., AKMA Ind
  • An authentication vector (“AV”) may also be included in the response.
  • the AUSF 506 receives the AKMA indication from the UDM 508, the AUSF 506 stores the KAUSF, and generates 520 the AKMA anchor key (KAKMA) and generates 524 an AKMA key identifier (“ID”) (“A-KID”) from KAUSF after the primary authentication procedure is successfully completed. Moreover, the PEMC/PEGC 502 generates 518 the KAKMA and generated 522 the A-KID from the KAUSF before initiating communication with an AKMA application function.
  • a third communication 526 after AKMA key material is generated, the AUSF selects the AAnF 510, and sends the generated A-KID, and KAK A to the AAnF 510 together with the SUPI of the PEMC/PEGC 502 using the Naanf_AKMA_KeyRegistration request service operation.
  • the transmission to the AAnF 510 includes the list of managed PIN elements IDs and the operator PIN policies for binding PIN elements.
  • the AAnF 510 may store the latest information sent by the AUSF. It should be noted that the AUSF 506 need not store any AKMA key material after delivery to the AAnF 510.
  • the AUSF 506 when re-authentication runs, the AUSF 506 generates a new A-KID, and a new KAKMA and sends the new generated A-KID and KAKMA to the AAnF 510.
  • the AAnF 510 After receiving the new generated A-KID and KAKMA, the AAnF 510 deletes the old A-KID and KAKMA and stores the new generated A-KID and KAKMA.
  • the AAnF 510 sends a response to the AUSF 506 using a Naanf_AKMA_AnchorKey_Register response service operation.
  • the A-KID identifies the KAKMA key of a UE.
  • the A-KID may be in a network access identifier (“NAI”) format (e.g., usemame@realm).
  • NAI network access identifier
  • the username part may include an RID and an AKMA temporary UE ID (“A-TID”), and the realm part may include a home network identifier.
  • A-TID may be derived from KAUSF.
  • the AUSF may use the RID received from the UDM 508 to derive A-KID.
  • KAKMA may be derived from KAUSF. Since KAKMA and A- TID in A-KID are both derived from KAUSF based on a primary authentication run, the KAKMA and A-KID may only be refreshed by a new successful primary authentication.
  • a PEMC/PEGC connects to a PIN AF for establishment of a binding service, the AKMA procedures for the application session establishment may be carried out. The whole communication may also take place via a network exposure function (“NEF”).
  • NEF network exposure function
  • FIG. 6 is a schematic block diagram illustrating one embodiment of a system 600 for PIN AF provisioning at application session establishment.
  • the system 600 includes a PEMC/PEGC 602, an AUSF 604, an AAnF 606, and a PIN AF 608.
  • Each of the communications in the system 600 may include one or more messages.
  • the PEMC/PEGC 602 and the AKMA AF needs to know whether to use AKMA. This knowledge may be implicit to a specific application on the PEMC/PEGC 602 and the AKMA AF or indicated by the AKMA AF to the PEMC/PEGC 602.
  • a first communication 610 there may be a primary authentication and establishment of KAKMA.
  • the PEMC/PEGC 602 may generate an AKMA anchor key (KAKMA) and the A-KID from the KAUSF before initiating communication with an AKMA application function (“AF”) and/or PIN AF 608.
  • KAKMA AKMA anchor key
  • AF application function
  • PIN AF 608 PIN application function
  • the PEMC/PEGC 602 may include the derived A-KID in an application session establishment request message.
  • the PEMC/PEGC 602 may derive KAF before sending the message or afterwards.
  • the PEMC/PEGC 602 may include its PIN element ID.
  • a third communication 614 if the PIN AF 608 does not have an active context associated with the A-KID, then the PIN AF 608 selects the AAnF 606 and sends a Naanf_AKMA_ApplicationKey_Get request message to the AAnF 606 with the A-KID to request the KAF for the PEMC/PEGC 602.
  • the PIN AF 608 may also include its identity (AF ID) in the request.
  • AF ID consists of a fully qualified domain name (“FQDN”) of the PIN AF 608 and the Ua* security protocol identifier.
  • the Ua* security protocol identifier identifies a security protocol that the PIN AF 608 will use with the PEMC/PEGC 602.
  • the AAnF 606 may check whether the AAnF 606 can provide a service to the PIN AF 608 based on a configured local policy or based on an authorization information or policy provided by a network repository function (“NRF”) using the AF ID. If it succeeds, the following procedures are executed. Otherwise, the AAnF 606 may reject the procedure. Moreover, the AAnF 606 may verify whether the subscriber is authorized to use AKMA based on the presence of the PEMC/PEGC 602 specific KAK A key identified by the A- KID. If KAKMA is present in the AAnF 606, the AAnF 606 may continue with step 616.
  • NRF network repository function
  • KAKMA AKMA application key
  • the AAnF 606 sends a Naanf_AKMA_ApplicationKey_Get response to the PIN AF 608 with SUPI, KAF, a KAF expiration time, a list of managed PIN elements IDs, and/or operator PIN policies for binding PIN elements.
  • the PIN AF 608 sends an application session establishment response to the PEMC/PEGC 602. If the information in step 618 indicates failure of the AKMA key request, the PIN AF 608 may reject the application session establishment by including a failure cause. Afterwards, the PEMC/PEGC 602 may trigger a new application session establishment request with the latest A-KID to the PIN AF 608.
  • the PEMC/PEGC may provide its local authenticated PIN element IDs and its local binding policies to the PIN AF.
  • FIG. 7 is a schematic block diagram illustrating one embodiment of a system 700 for a PIN element binding policy update.
  • the system 700 includes a PEMC/PEGC 702, an AUSF 704, an AAnF 706, and a PIN AF 708.
  • Each of the communications in the system 700 may include one or more messages.
  • the PEMC/PEGC 702 and the AKMA AF before communication between the PEMC/PEGC 702 and an AKMA AF (or the PIN AF 708) can start, the PEMC/PEGC 702 and the AKMA AF needs to know whether to use AKMA. This knowledge may be implicit to a specific application on the PEMC/PEGC 702 and the AKMA AF or indicated by the AKMA AF to the PEMC/PEGC 702.
  • a first communication 710 there may be a primary authentication and establishment of KAKMA.
  • the PEMC/PEGC 702 may generate an AKMA anchor key (KAKMA) and the A-KID from the KAUSF before initiating communication with an AKMA application function (“AF”) and/or PIN AF 708.
  • KAKMA AKMA anchor key
  • AF application function
  • PIN AF 708 PIN application function
  • the PEMC/PEGC 702 may include the derived A-KID in an application session establishment request message.
  • the PEMC/PEGC 702 may derive KAF before sending the message or afterwards.
  • the PEMC/PEGC 702 may include its PIN element ID.
  • a third communication 714 if the PIN AF 708 does not have an active context associated with the A-KID, then the PIN AF 708 selects the AAnF 706 and sends a Naanf_AKMA_ApplicationKey_Get request message to the AAnF 706 with the A-KID to request the KAF for the PEMC/PEGC 702.
  • the PIN AF 708 may also include its identity (AF_ID) in the request.
  • AF ID consists of a fully qualified domain name (“FQDN”) of the PIN AF 708 and the Ua* security protocol identifier.
  • the Ua* security protocol identifier identifies a security protocol that the PIN AF 708 will use with the PEMC/PEGC 702.
  • the AAnF 706 may check whether the AAnF 706 can provide a service to the PIN AF 708 based on a configured local policy or based on an authorization information or policy provided by a NRF using the AF ID. If it succeeds, the following procedures are executed. Otherwise, the AAnF 706 may reject the procedure. Moreover, the AAnF 706 may verify whether the subscriber is authorized to use AKMA based on the presence of the PEMC/PEGC 702 specific KAKMA key identified by the A-KID. If KAKMA is present in the AAnF 706, the AAnF 706 may continue with step 716. If KAKMA is not present in the AAnF 706, the AAnF 706 may continue with step 718 with an error response.
  • the AAnF 706 derives 716 an AKMA application key (KAF) from KAKMA if it does not already have KAF.
  • KAF AKMA application key
  • the AAnF 706 sends a Naanf_AKMA_ApplicationKey_Get response to the PIN AF 708 with SUPI, KAF, a KAF expiration time, a list of managed PIN elements IDs, and/or operator PIN policies for binding PIN elements.
  • a fifth communication 720 the PIN AF 708 sends an application session establishment response to the PEMC/PEGC 702. If the information in step 718 indicates failure of the AKMA key request, the PIN AF 708 may reject the application session establishment by including a failure cause. Afterwards, the PEMC/PEGC 702 may trigger a new application session establishment request with the latest A-KID to the PIN AF 708.
  • a sixth communication 722 after the PEMC/PEGC 702 established a secure connection with the PIN AF 708 based on the KAF, the PEMC/PEGC 702 provides a PIN session binding policy request that may include a PEMC/PEGC PIN element ID, locally authenticated PIN element IDs, and local binding policies for the PIN AF 708.
  • the PIN AF 708 stores 724 the locally authenticated PIN element IDs and the local binding policies and matches them with the list of managed PIN elements IDs and the operator PIN policies for the binding.
  • the PIN AF 708 acknowledges the PIN session binding request from the PEMC/PEGC 702 with a PIN session binding policy response.
  • a pre-requisite for this may be that the PIN element behind a PEMC/PEGC is registered to a PIN AF on behalf of the PEMC/PEGC or directly if the PIN element has 3GPP credentials and is able to perform an AKMA registration.
  • FIG. 8 is a schematic block diagram illustrating one embodiment of a system 800 for binding PIN elements inside and outside a PIN.
  • the system 800 includes a PIN element #B 802, a PEMC/PEGC 804, a PIN AF 806, and a PIN element #D 808 in DN.
  • Each of the communications in the system 800 may include one or more messages.
  • the PEMC/PEGC 804 and the PIN Element #D 808 in the DN outside the PIN perform 810 and 812 primary authentication and the establishment of KAKMA for PIN services.
  • the PEMC/PEGC 804 and the PIN element #D 808 perform an application session establishment procedure respectively (e.g., as described in the first embodiment and the second embodiment).
  • the PIN element #B 802 sends a request to send data to PIN element #D 808 to the PEMC/PEGC 804.
  • the PEMC/PEGC 804 performs 820 a local authorization and checks whether the PIN Element #B 802 is locally authenticated and whether it is allowed to send data to the target PIN Element #D 808 based on the local configured policies or based on the operator managed policies.
  • the PEMC/PEGC 804 sends a data request to the PIN AF 806 including a A-TID of the PEMC/PEGC 804, a PEGC PIN element ID, and a target PIN element #D ID.
  • the PEMC/PEGC 804 may be an endpoint of the communication from the PIN AF 806 point of view in case the PIN Element #B 802 does not have the capability to support the termination of the end to end communication.
  • the PEMC/PEGC 804 may include the source PIN element #B ID to indicate the origination of the request.
  • the PIN AF 806 checks 824 whether the target PIN element #D 808 is registered at the PIN AF 806 and checks the previously provisioned policies from the PEMC/PEGC 804 and the operator policies from an AAnF whether the PEMC, PEGC, and/or PIN element #B 802 is authorized to connect directly to the target PIN element #D 808.
  • the PIN AF 806 derives a direct communication key KDC-
  • the root key K roo t which is input to the KDF for the key derivation of the KDC can be based on the keys available in the PIN AF 806, e.g., the PEMC, PEGC, and/or PIN element #B 802 or the target PIN element #D 808 session key KAF or a concatenation of both keys KAF as input root key.
  • the following parameters may be used: IDs of the PIN elements to be paired (e.g., here PEMC, PEGC PIN element ID, PIN element #B 802, PIN element #D 808), but there may be more than two paired PIN elements), a NONCE, which may be a random number, a counter, and so forth.
  • the PIN AF 806 generates an access token which is used to mutually authenticate the two PIN elements among each other.
  • the access token may be an OAuth token or any other token. In the simplest case, it may be a sufficient long random number.
  • the PIN AF 806 sends the security key KDC and the access token to the PEMC/PEGC 804 in a protected paring request message.
  • the PEMC/PEGC 804 may terminate the secure binding on the behalf of the PIN element #B 802, in case the PIN element #B 802 does not have the capabilities for it. In that case, the PEMC/PEGC 804 did not include the PIN element #B ID in the request in step 822. Otherwise, if the PIN element #B 802 is capable to terminate the end- to-end with the PIN element #D 808, then the PEMC/PEGC 804 forwards the security key KDC and the access token to the PIN element #B 802.
  • the PIN AF 806 sends the security key KDC and the access token to the PIN element #D 808 in a protected paring request message.
  • the request includes the PEMC/PEGC 804 address and may include the PIN element #B ID.
  • the PEMC/PEGC 804 and/or PIN element #B and #D perform authentication between them by sending either the access token and verify it or performing a mutual exchange: the PEMC/PEGC 804 and/or PIN element #B sends an authentication message to PIN element #D 808, including a hash (e.g., secure hash algorithm (“SHA”) 1 (“SHA1”), SHA 2 (“SHA2”), or SHA 3 (“SHA3”) with their variants) of the access token and its PIN element ID.
  • SHA secure hash algorithm
  • SHA2 SHA 2
  • SHA3 SHA 3
  • PIN element #D 808 receives the message and also performs a hash over the access token and the PEMC/PEGC 804 and/or PIN element #B ID (e.g., received previously from the PIN AF 806) and compares it with the value received from the PEMC/PEGC 804 and/or PIN element #B 802. If identical, the PIN element #D 808 sends also an authentication response with the hash of the access token and the PIN element #D ID, the receiving PEMC/PEGC 804 and/or PIN elements #B 802 then also computes the hash and compares it with the received one.
  • a hash over the access token and the PEMC/PEGC 804 and/or PIN element #B ID e.g., received previously from the PIN AF 806
  • the PIN element #D 808 sends also an authentication response with the hash of the access token and the PIN element #D ID
  • the receiving PEMC/PEGC 804 and/or PIN elements #B 802 then also computes
  • the PEMC/PEGC 804 and/or PIN element #B 802 sets up a secure connection with the security key KDC- This can be done either with an internet protocol (“IP”) security (“IPsec”) standalone (“SA”) establishment or using a block cipher, for example.
  • IP internet protocol
  • IPsec internet protocol security
  • SA block cipher
  • FIG. 9 is a flow chart diagram illustrating one embodiment of a method 900 for establishing an application session corresponding to a PIN element.
  • the method 900 is performed by an apparatus, such as the network unit 104.
  • the method 900 may be performed by a processor executing program code, for example, a microcontroller, a microprocessor, a CPU, a GPU, an auxiliary processing unit, a FPGA, or the like.
  • the method 900 includes performing 902, at a first network device, a local authentication and registration of PIN elements with preconfigured credentials. In some embodiments, the method 900 includes transmitting 904, to a PIN AF, a first request message including an application session establishment request. In certain embodiments, the method 900 includes transmitting 906, from the PIN AF, a first response message including an application session establishment response.
  • the method 900 further comprises transmitting, to the PIN AF, a second request message comprising a PIN session binding policy request, wherein the second request message comprises a list of authenticated PIN element IDs and corresponding binding policies.
  • the method 900 further comprises receiving, from the PIN AF, a second response message comprising a PIN session binding policy response.
  • the method 900 further comprises receiving a data send request from a locally registered PIN element.
  • the method 900 further comprises transmitting, to the PIN AF, a third request message comprising a data request message an A-TID of the first network device, a (PEGC) PIN element ID, a target PIN element ID, a source PIN element ID, or some combination thereof.
  • the method 900 further comprises receiving, from the PIN AF, a third response message comprising a data response message comprising a direct communication key (KDC) and an access token.
  • KDC direct communication key
  • the method 900 further comprises transmitting a data send response to the locally registered PIN element, the data send response comprising the KDC and the access token.
  • the first network device comprises a (PEGC), a (PEMC), or a combination thereof.
  • FIG 10 is a flow chart diagram illustrating another embodiment of a method 1000 for establishing an application session corresponding to a PIN element.
  • the method 1000 is performed by an apparatus, such as the network unit 104.
  • the method 1000 may be performed by a processor executing program code, for example, a microcontroller, a microprocessor, a CPU, a GPU, an auxiliary processing unit, a FPGA, or the like.
  • the method 1000 includes receiving 1002, at a PIN AF from a first network device, a first request message including an application session establishment request. In some embodiments, the method 1000 includes transmitting 1004, to a second network device, a second request message including a Naanf_AKMA_ApplicationKey_Get request. In certain embodiments, the method 1000 includes receiving 1006, from the second network device, a first response message including a Naanf_AKMA_ApplicationKey_Get response. The first response message includes a list of managed PIN element IDs and their corresponding binding policies. In various embodiments, the method 1000 includes transmitting 1008, to the first network device, a second response message including an application session establishment response.
  • the method 1000 further comprises receiving, from the first network device, a third request message comprising a PIN session binding policy request, wherein the third request message comprises a list of authenticated PIN element IDs and corresponding binding policies.
  • the method 1000 further comprises storing the list of authenticated PIN element IDs and their corresponding binding policies.
  • the method 1000 further comprises matching the list of managed PIN element IDs and their corresponding binding polices to the list of authenticated PIN element IDs and their corresponding binding policies.
  • the method 1000 further comprises transmitting, to the first network device, a third response message comprising a PIN session binding policy response.
  • the method 1000 further comprises receiving, from the first network device, a data request message, wherein the data request message comprises an A-TID of the first network device, a (PEGC) PIN element ID, a target PIN element ID, a source PIN element ID, or some combination thereof.
  • the method 1000 further comprises determining a binding of source PIN elements and target PIN elements.
  • the method 1000 further comprises determining a binding of two or more locally registered PIN elements. In one embodiment, the method 1000 further comprises deriving a direct communication key (KDC) and an access token.
  • KDC direct communication key
  • the method 1000 further comprises transmitting, to the first network device, a protected pairing request message including the KDC and the access token.
  • the second network device comprises an AKMA anchor function (AAnF).
  • FIG 11 is a flow chart diagram illustrating a further embodiment of a method 1100 for establishing an application session corresponding to a PIN element.
  • the method 1100 is performed by an apparatus, such as the remote unit 102 and/or the network unit 104.
  • the method 1100 may be performed by a processor executing program code, for example, a microcontroller, a microprocessor, a CPU, a GPU, an auxiliary processing unit, a FPGA, or the like.
  • the method 1100 includes performing 1102, at a PIN element, a local authentication and registration of the PIN element with preconfigured credentials.
  • the method 1100 includes sending 1104 a request to a first network device for sending data to a second device outside the local network.
  • the method 1100 further comprises receiving a pairing request message from the first network device, the pairing request message comprises a direct communication key (KDC), an access token, at least one target PIN element identifier, a PIN element address associated with at least one second network device, or some combination thereof.
  • the method 1100 further comprises computing an authentication value using a hash function, the access token, and the at least one target PIN element identifier.
  • the method 1100 further comprises transmitting an authentication request to the at least one second network device, and the authentication request comprises an authentication value.
  • the method 1100 further comprises receiving an authentication request comprising an authentication value from a network device with the at least one PIN element identifier from the pairing request message. In certain embodiments, the method 1100 further comprises computing an authentication value using a hash function, the access token, and the at least one PIN element identifier, and comparing the authentication value with the authentication value received from the network device with the at least one PIN element identifier from the pairing request message. In some embodiments, the method 1100 further comprises setting up the secure connection by deriving a security key (KDC).
  • KDC security key
  • an apparatus comprises a first network device.
  • the apparatus further comprises: a processor; and a transceiver coupled to the processor, wherein: the processor performs a local authentication and registration of PIN elements with preconfigured credentials; the transceiver transmits, to a PIN AF, a first request message comprising an application session establishment request; and the transceiver transmits, from the PIN AF, a first response message comprising an application session establishment response.
  • the transceiver transmits, to the PIN AF, a second request message comprising a PIN session binding policy request, wherein the second request message comprises a list of authenticated PIN element IDs and corresponding binding policies.
  • the transceiver receives, from the PIN AF, a second response message comprising a PIN session binding policy response.
  • the transceiver receives a data send request from a locally registered PIN element.
  • the transceiver transmits, to the PIN AF, a third request message comprising a data request message an authentication and key management for A-TID of the first network device, a (PEGC) PIN element ID, a target PIN element ID, a source PIN element ID, or some combination thereof.
  • the transceiver receives, from the PIN AF, athird response message comprising a data response message comprising a direct communication key (KDC) and an access token.
  • KDC direct communication key
  • the transceiver transmits a data send response to the locally registered PIN element, the data send response comprising the KDC and the access token.
  • the first network device comprises a (PEGC), a (PEMC), or a combination thereof.
  • a method of a first network device comprises: performing a local authentication and registration of PIN elements with preconfigured credentials; transmitting, to a PIN AF, a first request message comprising an application session establishment request; and transmitting, from the PIN AF, a first response message comprising an application session establishment response.
  • the method further comprises transmitting, to the PIN AF, a second request message comprising a PIN session binding policy request, wherein the second request message comprises a list of authenticated PIN element IDs and corresponding binding policies.
  • the method further comprises receiving, from the PIN AF, a second response message comprising a PIN session binding policy response.
  • the method further comprises receiving a data send request from a locally registered PIN element.
  • the method further comprises transmitting, to the PIN AF, a third request message comprising a data request message an A-TID of the first network device, a (PEGC) PIN element ID, a target PIN element ID, a source PIN element ID, or some combination thereof.
  • a third request message comprising a data request message an A-TID of the first network device, a (PEGC) PIN element ID, a target PIN element ID, a source PIN element ID, or some combination thereof.
  • the method further comprises receiving, from the PIN AF, athird response message comprising a data response message comprising a direct communication key (KDC) and an access token.
  • KDC direct communication key
  • the method further comprises transmitting a data send response to the locally registered PIN element, the data send response comprising the KDC and the access token.
  • the first network device comprises a (PEGC), a (PEMC), or a combination thereof.
  • an apparatus comprises a PIN AF.
  • the apparatus further comprises: a processor; and a transceiver coupled to the processor, wherein: the transceiver receives, from a first network device, a first request message comprising an application session establishment request; the transceiver transmits, to a second network device, a second request message comprising a Naanf_AKMA_ApplicationKey_Get request; the transceiver receives, from the second network device, a first response message comprising a Naanf_AKMA_ApplicationKey_Get response, wherein the first response message comprises a list of managed PIN element IDs and their corresponding binding policies; and the transceiver transmits, to the first network device, a second response message comprising an application session establishment response.
  • the transceiver receives, from the first network device, a third request message comprising a PIN session binding policy request, and the third request message comprises a list of authenticated PIN element IDs and corresponding binding policies.
  • the processor stores the list of authenticated PIN element IDs and their corresponding binding policies.
  • the processor matches the list of managed PIN element IDs and their corresponding binding polices to the list of authenticated PIN element IDs and their corresponding binding policies.
  • the transceiver transmits, to the first network device, a third response message comprising a PIN session binding policy response.
  • the transceiver receives, from the first network device, a data request message, and the data request message comprises an A-TID of the first network device, a (PEGC) PIN element ID, a target PIN element ID, a source PIN element ID, or some combination thereof.
  • a (PEGC) PIN element ID a target PIN element ID
  • a source PIN element ID a source PIN element ID
  • the processor determines a binding of source PIN elements and target PIN elements.
  • the processor determines a binding of two or more locally registered PIN elements.
  • the processor derives a direct communication key (KDC) and an access token.
  • KDC direct communication key
  • the transceiver transmits, to the first network device, a protected pairing request message including the KDC and the access token.
  • the second network device comprises an AKMA anchor function (AAnF).
  • a method of a PIN AF comprises: receiving, from a first network device, a first request message comprising an application session establishment request; transmitting, to a second network device, a second request message comprising a Naanf_AKMA_ApplicationKey_Get request; receiving, from the second network device, a first response message comprising a Naanf_AKMA_ApplicationKey_Get response, wherein the first response message comprises a list of managed PIN element IDs and their corresponding binding policies; and transmitting, to the first network device, a second response message comprising an application session establishment response.
  • the method further comprises receiving, from the first network device, a third request message comprising a PIN session binding policy request, wherein the third request message comprises a list of authenticated PIN element IDs and corresponding binding policies.
  • the method further comprises storing the list of authenticated PIN element IDs and their corresponding binding policies.
  • the method further comprises matching the list of managed PIN element IDs and their corresponding binding polices to the list of authenticated PIN element IDs and their corresponding binding policies.
  • the method further comprises transmitting, to the first network device, a third response message comprising a PIN session binding policy response.
  • the method further comprises receiving, from the first network device, a data request message, wherein the data request message comprises an A-TID of the first network device, a (PEGC) PIN element ID, a target PIN element ID, a source PIN element ID, or some combination thereof.
  • a data request message comprises an A-TID of the first network device, a (PEGC) PIN element ID, a target PIN element ID, a source PIN element ID, or some combination thereof.
  • the method further comprises determining a binding of source PIN elements and target PIN elements.
  • the method further comprises determining a binding of two or more locally registered PIN elements.
  • the method further comprises deriving a direct communication key (KDC) and an access token.
  • KDC direct communication key
  • the method further comprises transmitting, to the first network device, a protected pairing request message including the KDC and the access token.
  • the second network device comprises an AKMA anchor function (AAnF).
  • an apparatus comprises a PIN element.
  • the apparatus further comprises: a transceiver; and a processor coupled to the transceiver, wherein: the transceiver performs a local authentication and registration of the PIN element with preconfigured credentials; and the transceiver sends a request to a first network device for sending data to a second device outside the local network.
  • the transceiver receives a pairing request message from the first network device, the pairing request message comprises a direct communication key (KDC), an access token, at least one target PIN element identifier, a PIN element address associated with at least one second network device, or some combination thereof.
  • KDC direct communication key
  • the processor computes an authentication value using a hash function, the access token, and the at least one target PIN element identifier.
  • the transceiver transmits an authentication request to the at least one second network device, and the authentication request comprises an authentication value.
  • the transceiver receives an authentication request comprising an authentication value from a network device with the at least one PIN element identifier from the pairing request message.
  • the processor computes an authentication value using a hash function, the access token, and the at least one PIN element identifier, and compares the authentication value with the authentication value received from the network device with the at least one PIN element identifier from the pairing request message.
  • the processor sets up the secure connection by deriving a security key (KDC).
  • KDC security key
  • a method of a PIN element comprises: performing a local authentication and registration of the PIN element with preconfigured credentials; and sending a request to a first network device for sending data to a second device outside the local network.
  • the method further comprises receiving a pairing request message from the first network device, the pairing request message comprises a direct communication key (KDC), an access token, at least one target PIN element identifier, a PIN element address associated with at least one second network device, or some combination thereof.
  • KDC direct communication key
  • the method further comprises computing an authentication value using a hash function, the access token, and the at least one target PIN element identifier.
  • the method further comprises transmitting an authentication request to the at least one second network device, and the authentication request comprises an authentication value.
  • the method further comprises receiving an authentication request comprising an authentication value from a network device with the at least one PIN element identifier from the pairing request message.
  • the method further comprises computing an authentication value using a hash function, the access token, and the at least one PIN element identifier, and comparing the authentication value with the authentication value received from the network device with the at least one PIN element identifier from the pairing request message.
  • the method further comprises setting up the secure connection by deriving a security key (KDC).
  • KDC security key

Abstract

Apparatuses, methods, and systems are disclosed for establishing an application session corresponding to a personal internet of things network ("PIN") element. One method (900) includes performing (902), at a first network device, a local authentication and registration of PIN elements with preconfigured credentials. The method (900) includes transmitting (904), to a PIN application function ("AF"), a first request message including an application session establishment request. The method (900) includes transmitting (906), from the PIN AF, a first response message including an application session establishment response.

Description

ESTABLISHING AN APPLICATION SESSION CORRESPONDING TO A PIN ELEMENT
FIELD
[0001] The subject matter disclosed herein relates generally to wireless communications and more particularly relates to establishing an application session corresponding to a personal internet of things network (“PIN”) element.
BACKGROUND
[0002] In certain wireless communications networks, PIN elements may be used. In such networks, communication between PIN elements may be limited.
BRIEF SUMMARY
[0003] Methods for establishing an application session corresponding to a PIN element are disclosed. Apparatuses and systems also perform the functions of the methods. One embodiment of a method includes performing, at a first network device, a local authentication and registration of PIN elements with preconfigured credentials. In some embodiments, the method includes transmitting, to a PIN application function (“AF”), a first request message including an application session establishment request. In certain embodiments, the method includes transmitting, from the PIN AF, a first response message including an application session establishment response.
[0004] One apparatus for establishing an application session corresponding to a PIN element includes a first network device. In some embodiments, the apparatus includes a processor. In various embodiments, the apparatus includes a transceiver coupled to the processor. In certain embodiments, the processor performs a local authentication and registration of PIN elements with preconfigured credentials. In some embodiments, the transceiver transmits, to a PIN AF, a first request message including an application session establishment request. In various embodiments, the transceiver transmits, from the PIN AF, a first response message including an application session establishment response.
[0005] Another embodiment of a method for establishing an application session corresponding to a PIN element includes receiving, at a PIN AF from a first network device, a first request message including an application session establishment request. In some embodiments, the method includes transmitting, to a second network device, a second request message including a Naanf_AKMA_ApplicationKey_Get request. In certain embodiments, the method includes receiving, from the second network device, a first response message including a Naanf_AKMA_ApplicationKey_Get response. The first response message includes a list of managed PIN element identifiers (“IDs”) and their corresponding binding policies. In various embodiments, the method includes transmitting, to the first network device, a second response message including an application session establishment response.
[0006] Another apparatus for establishing an application session corresponding to a PIN element includes a PIN AF. In some embodiments, the apparatus includes a processor. In various embodiments, the apparatus includes a transceiver coupled to the processor. In certain embodiments, the transceiver receives, from a first network device, a first request message including an application session establishment request. In some embodiments, the transceiver transmits, to a second network device, a second request message including a Naanf_AKMA_ApplicationKey_Get request. In various embodiments, the transceiver receives, from the second network device, a first response message including a Naanf_AKMA_ApplicationKey_Get response. In certain embodiments, the first response message includes a list of managed PIN element IDs and their corresponding binding policies. In some embodiments, the transceiver transmits, to the first network device, a second response message including an application session establishment response.
[0007] A further embodiment of a method for establishing an application session corresponding to a PIN element includes performing, at a PIN element, a local authentication and registration of the PIN element with preconfigured credentials. In some embodiments, the method includes sending a request to a first network device for sending data to a second device outside the local network.
[0008] A further apparatus for establishing an application session corresponding to a PIN element includes a PIN element. In some embodiments, the apparatus includes a transceiver. In various embodiments, the apparatus includes a processor coupled to the transceiver. In certain embodiments, the transceiver performs a local authentication and registration of the PIN element with preconfigured credentials. In some embodiments, the transceiver sends a request to a first network device for sending data to a second device outside the local network.
BRIEF DESCRIPTION OF THE DRAWINGS
[0009] A more particular description of the embodiments briefly described above will be rendered by reference to specific embodiments that are illustrated in the appended drawings. Understanding that these drawings depict only some embodiments and are not therefore to be considered to be limiting of scope, the embodiments will be described and explained with additional specificity and detail through the use of the accompanying drawings, in which:
[0010] Figure 1 is a schematic block diagram illustrating one embodiment of a wireless communication system for establishing an application session corresponding to a PIN element; [0011] Figure 2 is a schematic block diagram illustrating one embodiment of an apparatus that may be used for establishing an application session corresponding to a PIN element;
[0012] Figure 3 is a schematic block diagram illustrating one embodiment of an apparatus that may be used for establishing an application session corresponding to a PIN element;
[0013] Figure 4 is a schematic block diagram illustrating one embodiment of a system including PIN elements;
[0014] Figure 5 is a schematic block diagram illustrating one embodiment of a system for an authentication and key management for applications (“AKMA”) anchor function (“AAnF”) provisioning at primary authentication;
[0015] Figure 6 is a schematic block diagram illustrating one embodiment of a system for PIN AF provisioning at application session establishment;
[0016] Figure 7 is a schematic block diagram illustrating one embodiment of a system for a PIN element binding policy update;
[0017] Figure 8 is a schematic block diagram illustrating one embodiment of a system for binding PIN elements inside and outside a PIN;
[0018] Figure 9 is a flow chart diagram illustrating one embodiment of a method for establishing an application session corresponding to a PIN element; and
[0019] Figure 10 is a flow chart diagram illustrating another embodiment of a method for establishing an application session corresponding to a PIN element; and
[0020] Figure 11 is a flow chart diagram illustrating a further embodiment of a method for establishing an application session corresponding to a PIN element.
DETAILED DESCRIPTION
[0021] As will be appreciated by one skilled in the art, aspects of the embodiments may be embodied as a system, apparatus, method, or program product. Accordingly, embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, embodiments may take the form of a program product embodied in one or more computer readable storage devices storing machine readable code, computer readable code, and/or program code, referred hereafter as code. The storage devices may be tangible, non-transitory, and/or non-transmission. The storage devices may not embody signals. In a certain embodiment, the storage devices only employ signals for accessing code.
[0022] Certain of the functional units described in this specification may be labeled as modules, in order to more particularly emphasize their implementation independence. For example, a module may be implemented as a hardware circuit comprising custom very-large-scale integration (“VLSI”) circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.
[0023] Modules may also be implemented in code and/or software for execution by various types of processors. An identified module of code may, for instance, include one or more physical or logical blocks of executable code which may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may include disparate instructions stored in different locations which, when joined logically together, include the module and achieve the stated purpose for the module.
[0024] Indeed, a module of code may be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Similarly, operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different computer readable storage devices. Where a module or portions of a module are implemented in software, the software portions are stored on one or more computer readable storage devices.
[0025] Any combination of one or more computer readable medium may be utilized. The computer readable medium may be a computer readable storage medium. The computer readable storage medium may be a storage device storing the code. The storage device may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, holographic, micromechanical, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
[0026] More specific examples (a non-exhaustive list) of the storage device would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (“RAM”), a read-only memory (“ROM”), an erasable programmable read-only memory (“EPROM” or Flash memory), a portable compact disc readonly memory (“CD-ROM”), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. [0027] Code for carrying out operations for embodiments may be any number of lines and may be written in any combination of one or more programming languages including an object oriented programming language such as Python, Ruby, Java, Smalltalk, C++, or the like, and conventional procedural programming languages, such as the "C" programming language, or the like, and/or machine languages such as assembly languages. The code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (“LAN”) or a wide area network (“WAN”), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
[0028] Reference throughout this specification to “one embodiment,” “an embodiment,” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. Thus, appearances of the phrases “in one embodiment,” “in an embodiment,” and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment, but mean “one or more but not all embodiments” unless expressly specified otherwise. The terms “including,” “comprising,” “having,” and variations thereof mean “including but not limited to,” unless expressly specified otherwise. An enumerated listing of items does not imply that any or all of the items are mutually exclusive, unless expressly specified otherwise. The terms “a,” “an,” and “the” also refer to “one or more” unless expressly specified otherwise.
[0029] Furthermore, the described features, structures, or characteristics of the embodiments may be combined in any suitable manner. In the following description, numerous specific details are provided, such as examples of programming, software modules, user selections, network transactions, database queries, database structures, hardware modules, hardware circuits, hardware chips, etc., to provide a thorough understanding of embodiments. One skilled in the relevant art will recognize, however, that embodiments may be practiced without one or more of the specific details, or with other methods, components, materials, and so forth. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of an embodiment.
[0030] Aspects of the embodiments are described below with reference to schematic flowchart diagrams and/or schematic block diagrams of methods, apparatuses, systems, and program products according to embodiments. It will be understood that each block of the schematic flowchart diagrams and/or schematic block diagrams, and combinations of blocks in the schematic flowchart diagrams and/or schematic block diagrams, can be implemented by code. The code may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the schematic flowchart diagrams and/or schematic block diagrams block or blocks.
[0031] The code may also be stored in a storage device that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the storage device produce an article of manufacture including instructions which implement the function/act specified in the schematic flowchart diagrams and/or schematic block diagrams block or blocks.
[0032] The code may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the code which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
[0033] The schematic flowchart diagrams and/or schematic block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of apparatuses, systems, methods and program products according to various embodiments. In this regard, each block in the schematic flowchart diagrams and/or schematic block diagrams may represent a module, segment, or portion of code, which includes one or more executable instructions of the code for implementing the specified logical function(s).
[0034] It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the Figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. Other steps and methods may be conceived that are equivalent in function, logic, or effect to one or more blocks, or portions thereof, of the illustrated Figures.
[0035] Although various arrow types and line types may be employed in the flowchart and/or block diagrams, they are understood not to limit the scope of the corresponding embodiments. Indeed, some arrows or other connectors may be used to indicate only the logical flow of the depicted embodiment. For instance, an arrow may indicate a waiting or monitoring period of unspecified duration between enumerated steps of the depicted embodiment. It will also be noted that each block of the block diagrams and/or flowchart diagrams, and combinations of blocks in the block diagrams and/or flowchart diagrams, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and code.
[0036] The description of elements in each figure may refer to elements of proceeding figures. Like numbers refer to like elements in all figures, including alternate embodiments of like elements.
[0037] Figure 1 depicts an embodiment of a wireless communication system 100 for establishing an application session corresponding to a PIN element. In one embodiment, the wireless communication system 100 includes remote units 102 and network units 104. Even though a specific number of remote units 102 and network units 104 are depicted in Figure 1, one of skill in the art will recognize that any number of remote units 102 and network units 104 may be included in the wireless communication system 100.
[0038] In one embodiment, the remote units 102 may include computing devices, such as desktop computers, laptop computers, personal digital assistants (“PDAs”), tablet computers, smart phones, smart televisions (e.g., televisions connected to the Internet), set-top boxes, game consoles, security systems (including security cameras), vehicle on-board computers, network devices (e.g., routers, switches, modems), aerial vehicles, drones, or the like. In some embodiments, the remote units 102 include wearable devices, such as smart watches, fitness bands, optical head-mounted displays, or the like. Moreover, the remote units 102 may be referred to as subscriber units, mobiles, mobile stations, users, terminals, mobile terminals, fixed terminals, subscriber stations, UE, user terminals, a device, or by other terminology used in the art. The remote units 102 may communicate directly with one or more of the network units 104 via uplink (“UL”) communication signals. In certain embodiments, the remote units 102 may communicate directly with other remote units 102 via sidelink communication.
[0039] The network units 104 may be distributed over a geographic region. In certain embodiments, a network unit 104 may also be referred to and/or may include one or more of an access point, an access terminal, a base, a base station, a location server, a core network (“CN”), a radio network entity, a Node-B, an evolved node-B (“eNB”), a 5G node-B (“gNB”), a Home Node-B, a relay node, a device, a core network, an aerial server, a radio access node, an access point (“AP”), new radio (‘NR”), a network entity, an access and mobility management function (“AMF”), a unified data management (“UDM”), a unified data repository (“UDR”), a UDM/UDR, a policy control function (“PCF”), a radio access network (“RAN”), a network slice selection function (“NSSF”), an operations, administration, and management (“0AM”), a session management function (“SMF”), a user plane function (“UPF”), an application function, an authentication server function (“AUSF”), security anchor functionality (“SEAF”), trusted non- third generation partnership project (“3GPP”) gateway function (“TNGF”), or by any other terminology used in the art. The network units 104 are generally part of a radio access network that includes one or more controllers communicably coupled to one or more corresponding network units 104. The radio access network is generally communicably coupled to one or more core networks, which may be coupled to other networks, like the Internet and public switched telephone networks, among other networks. These and other elements of radio access and core networks are not illustrated but are well known generally by those having ordinary skill in the art.
[0040] In one implementation, the wireless communication system 100 is compliant with NR protocols standardized in 3GPP, wherein the network unit 104 transmits using an orthogonal frequency division multiplexing (“OFDM”) modulation scheme on the downlink (“DL”) and the remote units 102 transmit on the UL using a single-carrier frequency division multiple access (“SC-FDMA”) scheme or an OFDM scheme. More generally, however, the wireless communication system 100 may implement some other open or proprietary communication protocol, for example, WiMAX, institute of electrical and electronics engineers (“IEEE”) 802. 11 variants, global system for mobile communications (“GSM”), general packet radio service (“GPRS”), universal mobile telecommunications system (“UMTS”), long term evolution (“LTE”) variants, code division multiple access 2000 (“CDMA2000”), Bluetooth®, ZigBee, Sigfoxx, among other protocols. The present disclosure is not intended to be limited to the implementation of any particular wireless communication system architecture or protocol.
[0041] The network units 104 may serve a number of remote units 102 within a serving area, for example, a cell or a cell sector via a wireless communication link. The network units 104 transmit DL communication signals to serve the remote units 102 in the time, frequency, and/or spatial domain.
[0042] In various embodiments, a network unit 104 may perform, at a first network device, a local authentication and registration of PIN elements with preconfigured credentials. In some embodiments, the network unit 104 may transmit, to a PIN AF, a first request message including an application session establishment request. In certain embodiments, the network unit 104 may transmit, from the PIN AF, a first response message including an application session establishment response. Accordingly, the network unit 104 may be used for establishing an application session corresponding to a PIN element.
[0043] In certain embodiments, a network unit 104 may receive, at a PIN AF from a first network device, a first request message including an application session establishment request. In some embodiments, the network unit 104 may transmit, to a second network device, a second request message including a Naanf_AKMA_ApplicationKey_Get request. In certain embodiments, the network unit 104 may receive, from the second network device, a first response message including a Naanf_AKMA_ApplicationKey_Get response. The first response message includes a list of managed PIN element IDs and their corresponding binding policies. In various embodiments, the network unit 104 may transmit, to the first network device, a second response message including an application session establishment response. Accordingly, the network unit 104 may be used for establishing an application session corresponding to a PIN element.
[0044] In some embodiments, a remote unit 102 and/or a network unit 104 may perform, at a PIN element, a local authentication and registration of the PIN element with preconfigured credentials. In some embodiments, the remote unit 102 and/or the network unit 104 may send a request to a first network device for sending data to a second device outside the local network. Accordingly, the remote unit 102 and/or the network unit 104 may be used for establishing an application session corresponding to a PIN element.
[0045] Figure 2 depicts one embodiment of an apparatus 200 that may be used for establishing an application session corresponding to a PIN element. The apparatus 200 includes one embodiment of the remote unit 102. Furthermore, the remote unit 102 may include a processor 202, a memory 204, an input device 206, a display 208, a transmitter 210, and a receiver 212. In some embodiments, the input device 206 and the display 208 are combined into a single device, such as a touchscreen. In certain embodiments, the remote unit 102 may not include any input device 206 and/or display 208. In various embodiments, the remote unit 102 may include one or more of the processor 202, the memory 204, the transmitter 210, and the receiver 212, and may not include the input device 206 and/or the display 208.
[0046] The processor 202, in one embodiment, may include any known controller capable of executing computer-readable instructions and/or capable of performing logical operations. For example, the processor 202 may be a microcontroller, a microprocessor, a central processing unit (“CPU”), a graphics processing unit (“GPU”), an auxiliary processing unit, a field programmable gate array (“FPGA”), or similar programmable controller. In some embodiments, the processor 202 executes instructions stored in the memory 204 to perform the methods and routines described herein. The processor 202 is communicatively coupled to the memory 204, the input device 206, the display 208, the transmitter 210, and the receiver 212.
[0047] The memory 204, in one embodiment, is a computer readable storage medium. In some embodiments, the memory 204 includes volatile computer storage media. For example, the memory 204 may include a RAM, including dynamic RAM (“DRAM”), synchronous dynamic RAM (“SDRAM”), and/or static RAM (“SRAM”). In some embodiments, the memory 204 includes non-volatile computer storage media. For example, the memory 204 may include a hard disk drive, a flash memory, or any other suitable non-volatile computer storage device. In some embodiments, the memory 204 includes both volatile and non-volatile computer storage media. In some embodiments, the memory 204 also stores program code and related data, such as an operating system or other controller algorithms operating on the remote unit 102.
[0048] The input device 206, in one embodiment, may include any known computer input device including a touch panel, a button, a keyboard, a stylus, a microphone, or the like. In some embodiments, the input device 206 may be integrated with the display 208, for example, as a touchscreen or similar touch-sensitive display. In some embodiments, the input device 206 includes a touchscreen such that text may be input using a virtual keyboard displayed on the touchscreen and/or by handwriting on the touchscreen. In some embodiments, the input device 206 includes two or more different devices, such as a keyboard and a touch panel.
[0049] The display 208, in one embodiment, may include any known electronically controllable display or display device. The display 208 may be designed to output visual, audible, and/or haptic signals. In some embodiments, the display 208 includes an electronic display capable of outputting visual data to a user. For example, the display 208 may include, but is not limited to, a liquid crystal display (“LCD”), a light emitting diode (“LED”) display, an organic light emitting diode (“OLED”) display, a projector, or similar display device capable of outputting images, text, or the like to a user. As another, non-limiting, example, the display 208 may include a wearable display such as a smart watch, smart glasses, a heads-up display, or the like. Further, the display 208 may be a component of a smart phone, a personal digital assistant, a television, a table computer, a notebook (laptop) computer, a personal computer, a vehicle dashboard, or the like.
[0050] In certain embodiments, the display 208 includes one or more speakers for producing sound. For example, the display 208 may produce an audible alert or notification (e.g., a beep or chime). In some embodiments, the display 208 includes one or more haptic devices for producing vibrations, motion, or other haptic feedback. In some embodiments, all or portions of the display 208 may be integrated with the input device 206. For example, the input device 206 and display 208 may form a touchscreen or similar touch-sensitive display. In other embodiments, the display 208 may be located near the input device 206.
[0051] Although only one transmitter 210 and one receiver 212 are illustrated, the remote unit 102 may have any suitable number of transmitters 210 and receivers 212. The transmitter 210 and the receiver 212 may be any suitable type of transmitters and receivers. In one embodiment, the transmitter 210 and the receiver 212 may be part of a transceiver.
[0052] In certain embodiments, the transceiver performs a local authentication and registration of the PIN element with preconfigured credentials. In some embodiments, the transceiver sends a request to a first network device for sending data to a second device outside the local network.
[0053] Figure 3 depicts one embodiment of an apparatus 300 that may be used for establishing an application session corresponding to a PIN element. The apparatus 300 includes one embodiment of the network unit 104. Furthermore, the network unit 104 may include a processor 302, a memory 304, an input device 306, a display 308, atransmitter 310, and a receiver 312. As may be appreciated, the processor 302, the memory 304, the input device 306, the display 308, the transmitter 310, and the receiver 312 may be substantially similar to the processor 202, the memory 204, the input device 206, the display 208, the transmitter 210, and the receiver 212 of the remote unit 102, respectively.
[0054] In certain embodiments, the processor 302 performs a local authentication and registration of PIN elements with preconfigured credentials. In some embodiments, the transceiver transmits, to a PIN AF, a first request message including an application session establishment request. In various embodiments, the transceiver transmits, from the PIN AF, a first response message including an application session establishment response.
[0055] In some embodiments, the transceiver receives, from a first network device, a first request message including an application session establishment request. In some embodiments, the transceiver transmits, to a second network device, a second request message including a Naanf_AKMA_ApplicationKey_Get request. In various embodiments, the transceiver receives, from the second network device, a first response message including a Naanf_AKMA_ApplicationKey_Get response. In certain embodiments, the first response message includes a list of managed PIN element IDs and their corresponding binding policies. In some embodiments, the transceiver transmits, to the first network device, a second response message including an application session establishment response.
[0056] In various embodiments, the transceiver performs a local authentication and registration of the PIN element with preconfigured credentials. In some embodiments, the transceiver sends a request to a first network device for sending data to a second device outside the local network.
[0057] It should be noted that two or more embodiments described herein may be combined together. In certain embodiments, security may be used by a device for authentication, authorization, data protection, and registration to a mobile core network. In some embodiments, there may be security protection and access control that indicates 1) how a fifth generation system (“5GS”) supports secure protection for communications between personal internet of things (“loT”) network (“PIN”) elements (e.g., via a PIN element with gateway capabilities (“PEGC”) or via fifth generation core (“5GC”), or for communications between PIN elements and PEGC; and/or 2) gap analysis on how a 5GS supports mitigation of repeated and unauthorized attempts to access PIN elements (e.g., the from internet, or from other PIN elements via a PEGC).
[0058] In various embodiments, for binding PIN elements inside a PIN with those outside in a data network (“DN”), there may be a mechanism to establish communication between PIN elements. In such embodiments, the PIN elements may have 3GPP credentials but may also not have 3GPP credentials. Moreover, there may be direct communication between PIN elements inside and outside a PIN where a PIN element may not have 3GPP credentials.
[0059] In certain embodiments, PIN elements may connect to a non-3GPP network. In some embodiments, there may be different trust relationships with a non-3GPP access network (e.g., trusted, untrusted access) as well as different device capabilities (e.g., devices with 3GPP credentials with non-access stratum (NAS) capabilities, without NAS capabilities, behind a residential gateway or direct connection to the non-3GPP access point (“AP”)).
[0060] In some embodiments, there may be a direct communication (e.g., an IP multimedia system (“IMS”) voice and/or video session) with devices that both have 3GPP credentials and are registered in a mobile network. However, the PIN elements may not have 3GPP credentials for a registration to a mobile core network.
[0061] In various embodiments, there may be local registration and/or authentication at a gateway in a personal network for devices with and without 3GPP credentials. In certain embodiments, there may be registration of devices without 3GPP credentials in a 5GC and/or data connectivity for those devices explicitly with operator controlled traffic connection configuration. In some embodiment, devices without 3GPP credentials are limited to a residential gateway and not to end user devices (e.g., PIN elements). In various embodiments, a local binding for a direct communication within a local personal network may be performed and a service request procedure for data access to a DN via a 5GC may be made.
[0062] Figure 4 is a schematic block diagram illustrating one embodiment of a system 400 including PIN elements. The system 400 includes a PIN element #A 402 (e.g., motion sensor) that communicates a trigger to a PIN element #B 404 (e.g., surveillance camera). The PIN element #A 402 sends a motion detected (e.g., via locally encrypted commands) signal to a PIN element with management capabilities 406. Further, the PIN element #B 404 sends data to a PIN element with gateway capabilities 408. Moreover, the PIN element with management capabilities 406 provides a list of registered PIN elements to the PIN element with gateway capabilities 408. Also, the PIN element with management capabilities 406 provides an indication to turn a light switch (e.g., via locally encrypted commands) on to a PIN element #C 410 (e.g., light). The PIN element with gateway capabilities 408 sends information to a 5GC 412, and the 5GC 412 sends information to a PIN element #D 414 (e.g., smartphone). After all PIN elements are locally authenticated and registered, the PIN element with gateway capabilities 408 registers all the local PIN elements in the fifth generation (“5G”) core network (“CN”).
[0063] In certain embodiments there may be: 1) local registration and authentication with PIN elements without 3GPP credentials at a PIN element with management capabilities (“PEMC”) and/or PEGC (“PEMC/PEGC”) in a PIN; 2) registration of the PEMC and/or PEGC in a 5GC including local authenticated PIN elements without 3GPP credentials; 3) registration of PIN elements with 3GPP credentials locally and in the 5GC; 4) binding of local PIN elements; and/or 5) a service request for PIN elements without 3GPP credentials to send data via the 5GC.
[0064] In some embodiments, a PEMC and a PEGC may be collocated as one function within a same entity or may be implemented as two separate functions. The PEMC and/or the PEGC may be considered as a user equipment (“UE”) from the 5GC point of view with additional capabilities (e.g., registration of local PIN elements without 3GPP credentials to the 5GC).
[0065] In a first embodiment, there may be PIN application function (“AF”) provisioning.
[0066] In various embodiments, there may be provisioning of PIN related information at a time of PEMC/PEGC registration to a 5GC which triggers an AKMA key generation procedure. In such embodiments, an AAnF is provided with a list of managed PIN element IDs and operator PIN policies for this PEMC/PEGC in addition to AKMA information.
[0067] Figure 5 is a schematic block diagram illustrating one embodiment of a system 500 for AAnF provisioning at primary authentication. The system 500 includes a PEMC/PEGC 502, an AMF 504, an AUSF 506, a UDM 508, and an AAnF 510. Each of the communications in the system 500 may include one or more messages.
[0068] In a first communication 512, during a primary authentication procedure 514, the AUSF 506 interacts with the UDM 508 to fetch authentication information such as subscription credentials (e.g., authentication and key agreement (“AKA”) authentication vectors) and an authentication method using a Nudm_UEAuthentication_Get request service operation (e.g., the message may include subscription permanent identifier (“SUPI”) and/or subscription concealed identifier (“SUCI”)). The address of a PIN AF for binding PIN elements inside a PIN with those outside a PIN may be preconfigured in the PEMC/PEGC 502 or provisioned during primary authentication.
[0069] In a second communication 516, in a response which may include a Nudm_UEAuthentication_Get response, the UDM 508 may indicate to the AUSF 506 whether AKMA anchor keys need to be generated for the PEMC/PEGC 502. If an AKMA indicator (e.g., AKMA Ind) is included, the UDM 508 may include an RID of the PEMC/PEGC 502 as well as a list of managed PIN element IDs and operator PIN policies for binding PIN elements. An authentication vector (“AV”) may also be included in the response.
[0070] If the AUSF 506 receives the AKMA indication from the UDM 508, the AUSF 506 stores the KAUSF, and generates 520 the AKMA anchor key (KAKMA) and generates 524 an AKMA key identifier (“ID”) (“A-KID”) from KAUSF after the primary authentication procedure is successfully completed. Moreover, the PEMC/PEGC 502 generates 518 the KAKMA and generated 522 the A-KID from the KAUSF before initiating communication with an AKMA application function.
[0071] In a third communication 526, after AKMA key material is generated, the AUSF selects the AAnF 510, and sends the generated A-KID, and KAK A to the AAnF 510 together with the SUPI of the PEMC/PEGC 502 using the Naanf_AKMA_KeyRegistration request service operation. The transmission to the AAnF 510 includes the list of managed PIN elements IDs and the operator PIN policies for binding PIN elements. The AAnF 510 may store the latest information sent by the AUSF. It should be noted that the AUSF 506 need not store any AKMA key material after delivery to the AAnF 510. Moreover, when re-authentication runs, the AUSF 506 generates a new A-KID, and a new KAKMA and sends the new generated A-KID and KAKMA to the AAnF 510. After receiving the new generated A-KID and KAKMA, the AAnF 510 deletes the old A-KID and KAKMA and stores the new generated A-KID and KAKMA.
[0072] In a fourth communication 528, the AAnF 510 sends a response to the AUSF 506 using a Naanf_AKMA_AnchorKey_Register response service operation.
[0073] In some embodiments, the A-KID identifies the KAKMA key of a UE. Moreover, the A-KID may be in a network access identifier (“NAI”) format (e.g., usemame@realm). The username part may include an RID and an AKMA temporary UE ID (“A-TID”), and the realm part may include a home network identifier. Further, the A-TID may be derived from KAUSF. The AUSF may use the RID received from the UDM 508 to derive A-KID.
[0074] In various embodiments, KAKMA may be derived from KAUSF. Since KAKMA and A- TID in A-KID are both derived from KAUSF based on a primary authentication run, the KAKMA and A-KID may only be refreshed by a new successful primary authentication. Once a PEMC/PEGC connects to a PIN AF for establishment of a binding service, the AKMA procedures for the application session establishment may be carried out. The whole communication may also take place via a network exposure function (“NEF”).
[0075] Figure 6 is a schematic block diagram illustrating one embodiment of a system 600 for PIN AF provisioning at application session establishment. The system 600 includes a PEMC/PEGC 602, an AUSF 604, an AAnF 606, and a PIN AF 608. Each of the communications in the system 600 may include one or more messages.
[0076] In certain embodiments, before communication between the PEMC/PEGC 602 and an AKMA AF (or the PIN AF 708) can start, the PEMC/PEGC 602 and the AKMA AF needs to know whether to use AKMA. This knowledge may be implicit to a specific application on the PEMC/PEGC 602 and the AKMA AF or indicated by the AKMA AF to the PEMC/PEGC 602.
[0077] In a first communication 610, there may be a primary authentication and establishment of KAKMA.
[0078] In a second communication 612, the PEMC/PEGC 602 may generate an AKMA anchor key (KAKMA) and the A-KID from the KAUSF before initiating communication with an AKMA application function (“AF”) and/or PIN AF 608. When the PEMC/PEGC 602 initiates communication with the PIN AF 608, it may include the derived A-KID in an application session establishment request message. The PEMC/PEGC 602 may derive KAF before sending the message or afterwards. The PEMC/PEGC 602 may include its PIN element ID.
[0079] In a third communication 614, if the PIN AF 608 does not have an active context associated with the A-KID, then the PIN AF 608 selects the AAnF 606 and sends a Naanf_AKMA_ApplicationKey_Get request message to the AAnF 606 with the A-KID to request the KAF for the PEMC/PEGC 602. The PIN AF 608 may also include its identity (AF ID) in the request. In some embodiments, AF ID consists of a fully qualified domain name (“FQDN”) of the PIN AF 608 and the Ua* security protocol identifier. The Ua* security protocol identifier identifies a security protocol that the PIN AF 608 will use with the PEMC/PEGC 602.
[0080] In various embodiments, the AAnF 606 may check whether the AAnF 606 can provide a service to the PIN AF 608 based on a configured local policy or based on an authorization information or policy provided by a network repository function (“NRF”) using the AF ID. If it succeeds, the following procedures are executed. Otherwise, the AAnF 606 may reject the procedure. Moreover, the AAnF 606 may verify whether the subscriber is authorized to use AKMA based on the presence of the PEMC/PEGC 602 specific KAK A key identified by the A- KID. If KAKMA is present in the AAnF 606, the AAnF 606 may continue with step 616. If KAKMA is not present in the AAnF 606, the AAnF 606 may continue with step 618 with an error response. [0081] The AAnF 606 derives 616 an AKMA application key (K F) from KAKMA if it does not already have KAF.
[0082] In a fourth communication 618, the AAnF 606 sends a Naanf_AKMA_ApplicationKey_Get response to the PIN AF 608 with SUPI, KAF, a KAF expiration time, a list of managed PIN elements IDs, and/or operator PIN policies for binding PIN elements.
[0083] In a fifth communication 620, the PIN AF 608 sends an application session establishment response to the PEMC/PEGC 602. If the information in step 618 indicates failure of the AKMA key request, the PIN AF 608 may reject the application session establishment by including a failure cause. Afterwards, the PEMC/PEGC 602 may trigger a new application session establishment request with the latest A-KID to the PIN AF 608.
[0084] In a second embodiment, there may be a PEMC/PEGC local policy update at a PIN AF. After the PEMC/PEGC performs an application session establishment procedure and created a protected connection to a PIN AF, the PEMC/PEGC may provide its local authenticated PIN element IDs and its local binding policies to the PIN AF.
[0085] Figure 7 is a schematic block diagram illustrating one embodiment of a system 700 for a PIN element binding policy update. The system 700 includes a PEMC/PEGC 702, an AUSF 704, an AAnF 706, and a PIN AF 708. Each of the communications in the system 700 may include one or more messages.
[0086] In certain embodiments, before communication between the PEMC/PEGC 702 and an AKMA AF (or the PIN AF 708) can start, the PEMC/PEGC 702 and the AKMA AF needs to know whether to use AKMA. This knowledge may be implicit to a specific application on the PEMC/PEGC 702 and the AKMA AF or indicated by the AKMA AF to the PEMC/PEGC 702.
[0087] In a first communication 710, there may be a primary authentication and establishment of KAKMA.
[0088] In a second communication 712, the PEMC/PEGC 702 may generate an AKMA anchor key (KAKMA) and the A-KID from the KAUSF before initiating communication with an AKMA application function (“AF”) and/or PIN AF 708. When the PEMC/PEGC 702 initiates communication with the PIN AF 708, it may include the derived A-KID in an application session establishment request message. The PEMC/PEGC 702 may derive KAF before sending the message or afterwards. The PEMC/PEGC 702 may include its PIN element ID.
[0089] In a third communication 714, if the PIN AF 708 does not have an active context associated with the A-KID, then the PIN AF 708 selects the AAnF 706 and sends a Naanf_AKMA_ApplicationKey_Get request message to the AAnF 706 with the A-KID to request the KAF for the PEMC/PEGC 702. The PIN AF 708 may also include its identity (AF_ID) in the request. In some embodiments, AF ID consists of a fully qualified domain name (“FQDN”) of the PIN AF 708 and the Ua* security protocol identifier. The Ua* security protocol identifier identifies a security protocol that the PIN AF 708 will use with the PEMC/PEGC 702.
[0090] In various embodiments, the AAnF 706 may check whether the AAnF 706 can provide a service to the PIN AF 708 based on a configured local policy or based on an authorization information or policy provided by a NRF using the AF ID. If it succeeds, the following procedures are executed. Otherwise, the AAnF 706 may reject the procedure. Moreover, the AAnF 706 may verify whether the subscriber is authorized to use AKMA based on the presence of the PEMC/PEGC 702 specific KAKMA key identified by the A-KID. If KAKMA is present in the AAnF 706, the AAnF 706 may continue with step 716. If KAKMA is not present in the AAnF 706, the AAnF 706 may continue with step 718 with an error response.
[0091] The AAnF 706 derives 716 an AKMA application key (KAF) from KAKMA if it does not already have KAF.
[0092] In a fourth communication 718, the AAnF 706 sends a Naanf_AKMA_ApplicationKey_Get response to the PIN AF 708 with SUPI, KAF, a KAF expiration time, a list of managed PIN elements IDs, and/or operator PIN policies for binding PIN elements.
[0093] In a fifth communication 720, the PIN AF 708 sends an application session establishment response to the PEMC/PEGC 702. If the information in step 718 indicates failure of the AKMA key request, the PIN AF 708 may reject the application session establishment by including a failure cause. Afterwards, the PEMC/PEGC 702 may trigger a new application session establishment request with the latest A-KID to the PIN AF 708.
[0094] In a sixth communication 722, after the PEMC/PEGC 702 established a secure connection with the PIN AF 708 based on the KAF, the PEMC/PEGC 702 provides a PIN session binding policy request that may include a PEMC/PEGC PIN element ID, locally authenticated PIN element IDs, and local binding policies for the PIN AF 708.
[0095] The PIN AF 708 stores 724 the locally authenticated PIN element IDs and the local binding policies and matches them with the list of managed PIN elements IDs and the operator PIN policies for the binding.
[0096] In a seventh communication 726, the PIN AF 708 acknowledges the PIN session binding request from the PEMC/PEGC 702 with a PIN session binding policy response.
[0097] In a third embodiment, there may be direct communication establishment between PIN elements inside and outside of a PIN. In such embodiments, there may be binding and linking of two or more PIN elements together for a direct communication. A pre-requisite for this may be that the PIN element behind a PEMC/PEGC is registered to a PIN AF on behalf of the PEMC/PEGC or directly if the PIN element has 3GPP credentials and is able to perform an AKMA registration.
[0098] Figure 8 is a schematic block diagram illustrating one embodiment of a system 800 for binding PIN elements inside and outside a PIN. The system 800 includes a PIN element #B 802, a PEMC/PEGC 804, a PIN AF 806, and a PIN element #D 808 in DN. Each of the communications in the system 800 may include one or more messages.
[0099] The PEMC/PEGC 804 and the PIN Element #D 808 in the DN outside the PIN perform 810 and 812 primary authentication and the establishment of KAKMA for PIN services.
[0100] In a first communication 814 and in a second communication 816, the PEMC/PEGC 804 and the PIN element #D 808 perform an application session establishment procedure respectively (e.g., as described in the first embodiment and the second embodiment).
[0101] In a third communication 818, the PIN element #B 802 sends a request to send data to PIN element #D 808 to the PEMC/PEGC 804.
[0102] The PEMC/PEGC 804 performs 820 a local authorization and checks whether the PIN Element #B 802 is locally authenticated and whether it is allowed to send data to the target PIN Element #D 808 based on the local configured policies or based on the operator managed policies.
[0103] In a fourth communication 822, the PEMC/PEGC 804 sends a data request to the PIN AF 806 including a A-TID of the PEMC/PEGC 804, a PEGC PIN element ID, and a target PIN element #D ID. The PEMC/PEGC 804 may be an endpoint of the communication from the PIN AF 806 point of view in case the PIN Element #B 802 does not have the capability to support the termination of the end to end communication. The PEMC/PEGC 804 may include the source PIN element #B ID to indicate the origination of the request.
[0104] The PIN AF 806 checks 824 whether the target PIN element #D 808 is registered at the PIN AF 806 and checks the previously provisioned policies from the PEMC/PEGC 804 and the operator policies from an AAnF whether the PEMC, PEGC, and/or PIN element #B 802 is authorized to connect directly to the target PIN element #D 808. The PIN AF 806 derives a direct communication key KDC- The root key Kroot which is input to the KDF for the key derivation of the KDC can be based on the keys available in the PIN AF 806, e.g., the PEMC, PEGC, and/or PIN element #B 802 or the target PIN element #D 808 session key KAF or a concatenation of both keys KAF as input root key. As an additional input to the KDF, the following parameters may be used: IDs of the PIN elements to be paired (e.g., here PEMC, PEGC PIN element ID, PIN element #B 802, PIN element #D 808), but there may be more than two paired PIN elements), a NONCE, which may be a random number, a counter, and so forth. The PIN AF 806 generates an access token which is used to mutually authenticate the two PIN elements among each other. The access token may be an OAuth token or any other token. In the simplest case, it may be a sufficient long random number.
[0105] In a fifth communication 826, the PIN AF 806 sends the security key KDC and the access token to the PEMC/PEGC 804 in a protected paring request message.
[0106] In a sixth communication 828, the PEMC/PEGC 804 may terminate the secure binding on the behalf of the PIN element #B 802, in case the PIN element #B 802 does not have the capabilities for it. In that case, the PEMC/PEGC 804 did not include the PIN element #B ID in the request in step 822. Otherwise, if the PIN element #B 802 is capable to terminate the end- to-end with the PIN element #D 808, then the PEMC/PEGC 804 forwards the security key KDC and the access token to the PIN element #B 802.
[0107] In a seventh communication 830, the PIN AF 806 sends the security key KDC and the access token to the PIN element #D 808 in a protected paring request message. The request includes the PEMC/PEGC 804 address and may include the PIN element #B ID.
[0108] In an eighth communication 832, the PEMC/PEGC 804 and/or PIN element #B and #D perform authentication between them by sending either the access token and verify it or performing a mutual exchange: the PEMC/PEGC 804 and/or PIN element #B sends an authentication message to PIN element #D 808, including a hash (e.g., secure hash algorithm (“SHA”) 1 (“SHA1”), SHA 2 (“SHA2”), or SHA 3 (“SHA3”) with their variants) of the access token and its PIN element ID. PIN element #D 808 receives the message and also performs a hash over the access token and the PEMC/PEGC 804 and/or PIN element #B ID (e.g., received previously from the PIN AF 806) and compares it with the value received from the PEMC/PEGC 804 and/or PIN element #B 802. If identical, the PIN element #D 808 sends also an authentication response with the hash of the access token and the PIN element #D ID, the receiving PEMC/PEGC 804 and/or PIN elements #B 802 then also computes the hash and compares it with the received one. Then the PEMC/PEGC 804 and/or PIN element #B 802 sets up a secure connection with the security key KDC- This can be done either with an internet protocol (“IP”) security (“IPsec”) standalone (“SA”) establishment or using a block cipher, for example.
[0109] In a ninth communication 834, a data response acknowledgment my be transmitted. [0110] Figure 9 is a flow chart diagram illustrating one embodiment of a method 900 for establishing an application session corresponding to a PIN element. In some embodiments, the method 900 is performed by an apparatus, such as the network unit 104. In certain embodiments, the method 900 may be performed by a processor executing program code, for example, a microcontroller, a microprocessor, a CPU, a GPU, an auxiliary processing unit, a FPGA, or the like.
[0111] In various embodiments, the method 900 includes performing 902, at a first network device, a local authentication and registration of PIN elements with preconfigured credentials. In some embodiments, the method 900 includes transmitting 904, to a PIN AF, a first request message including an application session establishment request. In certain embodiments, the method 900 includes transmitting 906, from the PIN AF, a first response message including an application session establishment response.
[0112] In certain embodiments, the method 900 further comprises transmitting, to the PIN AF, a second request message comprising a PIN session binding policy request, wherein the second request message comprises a list of authenticated PIN element IDs and corresponding binding policies. In some embodiments, the method 900 further comprises receiving, from the PIN AF, a second response message comprising a PIN session binding policy response. In various embodiments, the method 900 further comprises receiving a data send request from a locally registered PIN element.
[0113] In one embodiment, the method 900 further comprises transmitting, to the PIN AF, a third request message comprising a data request message an A-TID of the first network device, a (PEGC) PIN element ID, a target PIN element ID, a source PIN element ID, or some combination thereof. In certain embodiments, the method 900 further comprises receiving, from the PIN AF, a third response message comprising a data response message comprising a direct communication key (KDC) and an access token.
[0114] In some embodiments, the method 900 further comprises transmitting a data send response to the locally registered PIN element, the data send response comprising the KDC and the access token. In various embodiments, the first network device comprises a (PEGC), a (PEMC), or a combination thereof.
[0115] Figure 10 is a flow chart diagram illustrating another embodiment of a method 1000 for establishing an application session corresponding to a PIN element. In some embodiments, the method 1000 is performed by an apparatus, such as the network unit 104. In certain embodiments, the method 1000 may be performed by a processor executing program code, for example, a microcontroller, a microprocessor, a CPU, a GPU, an auxiliary processing unit, a FPGA, or the like.
[0116] In various embodiments, the method 1000 includes receiving 1002, at a PIN AF from a first network device, a first request message including an application session establishment request. In some embodiments, the method 1000 includes transmitting 1004, to a second network device, a second request message including a Naanf_AKMA_ApplicationKey_Get request. In certain embodiments, the method 1000 includes receiving 1006, from the second network device, a first response message including a Naanf_AKMA_ApplicationKey_Get response. The first response message includes a list of managed PIN element IDs and their corresponding binding policies. In various embodiments, the method 1000 includes transmitting 1008, to the first network device, a second response message including an application session establishment response.
[0117] In certain embodiments, the method 1000 further comprises receiving, from the first network device, a third request message comprising a PIN session binding policy request, wherein the third request message comprises a list of authenticated PIN element IDs and corresponding binding policies. In some embodiments, the method 1000 further comprises storing the list of authenticated PIN element IDs and their corresponding binding policies. In various embodiments, the method 1000 further comprises matching the list of managed PIN element IDs and their corresponding binding polices to the list of authenticated PIN element IDs and their corresponding binding policies.
[0118] In one embodiment, the method 1000 further comprises transmitting, to the first network device, a third response message comprising a PIN session binding policy response. In certain embodiments, the method 1000 further comprises receiving, from the first network device, a data request message, wherein the data request message comprises an A-TID of the first network device, a (PEGC) PIN element ID, a target PIN element ID, a source PIN element ID, or some combination thereof. In some embodiments, the method 1000 further comprises determining a binding of source PIN elements and target PIN elements.
[0119] In various embodiments, the method 1000 further comprises determining a binding of two or more locally registered PIN elements. In one embodiment, the method 1000 further comprises deriving a direct communication key (KDC) and an access token.
[0120] In certain embodiments, the method 1000 further comprises transmitting, to the first network device, a protected pairing request message including the KDC and the access token. In some embodiments, the second network device comprises an AKMA anchor function (AAnF).
[0121] Figure 11 is a flow chart diagram illustrating a further embodiment of a method 1100 for establishing an application session corresponding to a PIN element. In some embodiments, the method 1100 is performed by an apparatus, such as the remote unit 102 and/or the network unit 104. In certain embodiments, the method 1100 may be performed by a processor executing program code, for example, a microcontroller, a microprocessor, a CPU, a GPU, an auxiliary processing unit, a FPGA, or the like. [0122] In various embodiments, the method 1100 includes performing 1102, at a PIN element, a local authentication and registration of the PIN element with preconfigured credentials. In some embodiments, the method 1100 includes sending 1104 a request to a first network device for sending data to a second device outside the local network.
[0123] In certain embodiments, the method 1100 further comprises receiving a pairing request message from the first network device, the pairing request message comprises a direct communication key (KDC), an access token, at least one target PIN element identifier, a PIN element address associated with at least one second network device, or some combination thereof. In some embodiments, the method 1100 further comprises computing an authentication value using a hash function, the access token, and the at least one target PIN element identifier. In various embodiments, the method 1100 further comprises transmitting an authentication request to the at least one second network device, and the authentication request comprises an authentication value.
[0124] In one embodiment, the method 1100 further comprises receiving an authentication request comprising an authentication value from a network device with the at least one PIN element identifier from the pairing request message. In certain embodiments, the method 1100 further comprises computing an authentication value using a hash function, the access token, and the at least one PIN element identifier, and comparing the authentication value with the authentication value received from the network device with the at least one PIN element identifier from the pairing request message. In some embodiments, the method 1100 further comprises setting up the secure connection by deriving a security key (KDC).
[0125] In one embodiment, an apparatus comprises a first network device. The apparatus further comprises: a processor; and a transceiver coupled to the processor, wherein: the processor performs a local authentication and registration of PIN elements with preconfigured credentials; the transceiver transmits, to a PIN AF, a first request message comprising an application session establishment request; and the transceiver transmits, from the PIN AF, a first response message comprising an application session establishment response.
[0126] In certain embodiments, the transceiver transmits, to the PIN AF, a second request message comprising a PIN session binding policy request, wherein the second request message comprises a list of authenticated PIN element IDs and corresponding binding policies.
[0127] In some embodiments, the transceiver receives, from the PIN AF, a second response message comprising a PIN session binding policy response.
[0128] In various embodiments, the transceiver receives a data send request from a locally registered PIN element. [0129] In one embodiment, the transceiver transmits, to the PIN AF, a third request message comprising a data request message an authentication and key management for A-TID of the first network device, a (PEGC) PIN element ID, a target PIN element ID, a source PIN element ID, or some combination thereof.
[0130] In certain embodiments, the transceiver receives, from the PIN AF, athird response message comprising a data response message comprising a direct communication key (KDC) and an access token.
[0131] In some embodiments, the transceiver transmits a data send response to the locally registered PIN element, the data send response comprising the KDC and the access token.
[0132] In various embodiments, the first network device comprises a (PEGC), a (PEMC), or a combination thereof.
[0133] In one embodiment, a method of a first network device comprises: performing a local authentication and registration of PIN elements with preconfigured credentials; transmitting, to a PIN AF, a first request message comprising an application session establishment request; and transmitting, from the PIN AF, a first response message comprising an application session establishment response.
[0134] In certain embodiments, the method further comprises transmitting, to the PIN AF, a second request message comprising a PIN session binding policy request, wherein the second request message comprises a list of authenticated PIN element IDs and corresponding binding policies.
[0135] In some embodiments, the method further comprises receiving, from the PIN AF, a second response message comprising a PIN session binding policy response.
[0136] In various embodiments, the method further comprises receiving a data send request from a locally registered PIN element.
[0137] In one embodiment, the method further comprises transmitting, to the PIN AF, a third request message comprising a data request message an A-TID of the first network device, a (PEGC) PIN element ID, a target PIN element ID, a source PIN element ID, or some combination thereof.
[0138] In certain embodiments, the method further comprises receiving, from the PIN AF, athird response message comprising a data response message comprising a direct communication key (KDC) and an access token.
[0139] In some embodiments, the method further comprises transmitting a data send response to the locally registered PIN element, the data send response comprising the KDC and the access token. [0140] In various embodiments, the first network device comprises a (PEGC), a (PEMC), or a combination thereof.
[0141] In one embodiment, an apparatus comprises a PIN AF. The apparatus further comprises: a processor; and a transceiver coupled to the processor, wherein: the transceiver receives, from a first network device, a first request message comprising an application session establishment request; the transceiver transmits, to a second network device, a second request message comprising a Naanf_AKMA_ApplicationKey_Get request; the transceiver receives, from the second network device, a first response message comprising a Naanf_AKMA_ApplicationKey_Get response, wherein the first response message comprises a list of managed PIN element IDs and their corresponding binding policies; and the transceiver transmits, to the first network device, a second response message comprising an application session establishment response.
[0142] In certain embodiments, the transceiver receives, from the first network device, a third request message comprising a PIN session binding policy request, and the third request message comprises a list of authenticated PIN element IDs and corresponding binding policies.
[0143] In some embodiments, the processor stores the list of authenticated PIN element IDs and their corresponding binding policies.
[0144] In various embodiments, the processor matches the list of managed PIN element IDs and their corresponding binding polices to the list of authenticated PIN element IDs and their corresponding binding policies.
[0145] In one embodiment, the transceiver transmits, to the first network device, a third response message comprising a PIN session binding policy response.
[0146] In certain embodiments, the transceiver receives, from the first network device, a data request message, and the data request message comprises an A-TID of the first network device, a (PEGC) PIN element ID, a target PIN element ID, a source PIN element ID, or some combination thereof.
[0147] In some embodiments, the processor determines a binding of source PIN elements and target PIN elements.
[0148] In various embodiments, the processor determines a binding of two or more locally registered PIN elements.
[0149] In one embodiment, the processor derives a direct communication key (KDC) and an access token.
[0150] In certain embodiments, the transceiver transmits, to the first network device, a protected pairing request message including the KDC and the access token. [0151] In some embodiments, the second network device comprises an AKMA anchor function (AAnF).
[0152] In one embodiment, a method of a PIN AF comprises: receiving, from a first network device, a first request message comprising an application session establishment request; transmitting, to a second network device, a second request message comprising a Naanf_AKMA_ApplicationKey_Get request; receiving, from the second network device, a first response message comprising a Naanf_AKMA_ApplicationKey_Get response, wherein the first response message comprises a list of managed PIN element IDs and their corresponding binding policies; and transmitting, to the first network device, a second response message comprising an application session establishment response.
[0153] In certain embodiments, the method further comprises receiving, from the first network device, a third request message comprising a PIN session binding policy request, wherein the third request message comprises a list of authenticated PIN element IDs and corresponding binding policies.
[0154] In some embodiments, the method further comprises storing the list of authenticated PIN element IDs and their corresponding binding policies.
[0155] In various embodiments, the method further comprises matching the list of managed PIN element IDs and their corresponding binding polices to the list of authenticated PIN element IDs and their corresponding binding policies.
[0156] In one embodiment, the method further comprises transmitting, to the first network device, a third response message comprising a PIN session binding policy response.
[0157] In certain embodiments, the method further comprises receiving, from the first network device, a data request message, wherein the data request message comprises an A-TID of the first network device, a (PEGC) PIN element ID, a target PIN element ID, a source PIN element ID, or some combination thereof.
[0158] In some embodiments, the method further comprises determining a binding of source PIN elements and target PIN elements.
[0159] In various embodiments, the method further comprises determining a binding of two or more locally registered PIN elements.
[0160] In one embodiment, the method further comprises deriving a direct communication key (KDC) and an access token.
[0161] In certain embodiments, the method further comprises transmitting, to the first network device, a protected pairing request message including the KDC and the access token. [0162] In some embodiments, the second network device comprises an AKMA anchor function (AAnF).
[0163] In one embodiment, an apparatus comprises a PIN element. The apparatus further comprises: a transceiver; and a processor coupled to the transceiver, wherein: the transceiver performs a local authentication and registration of the PIN element with preconfigured credentials; and the transceiver sends a request to a first network device for sending data to a second device outside the local network.
[0164] In certain embodiments, the transceiver receives a pairing request message from the first network device, the pairing request message comprises a direct communication key (KDC), an access token, at least one target PIN element identifier, a PIN element address associated with at least one second network device, or some combination thereof.
[0165] In some embodiments, the processor computes an authentication value using a hash function, the access token, and the at least one target PIN element identifier.
[0166] In various embodiments, the transceiver transmits an authentication request to the at least one second network device, and the authentication request comprises an authentication value.
[0167] In one embodiment, the transceiver receives an authentication request comprising an authentication value from a network device with the at least one PIN element identifier from the pairing request message.
[0168] In certain embodiments, the processor computes an authentication value using a hash function, the access token, and the at least one PIN element identifier, and compares the authentication value with the authentication value received from the network device with the at least one PIN element identifier from the pairing request message.
[0169] In some embodiments, the processor sets up the secure connection by deriving a security key (KDC).
[0170] In one embodiment, a method of a PIN element comprises: performing a local authentication and registration of the PIN element with preconfigured credentials; and sending a request to a first network device for sending data to a second device outside the local network.
[0171] In certain embodiments, the method further comprises receiving a pairing request message from the first network device, the pairing request message comprises a direct communication key (KDC), an access token, at least one target PIN element identifier, a PIN element address associated with at least one second network device, or some combination thereof.
[0172] In some embodiments, the method further comprises computing an authentication value using a hash function, the access token, and the at least one target PIN element identifier. [0173] In various embodiments, the method further comprises transmitting an authentication request to the at least one second network device, and the authentication request comprises an authentication value.
[0174] In one embodiment, the method further comprises receiving an authentication request comprising an authentication value from a network device with the at least one PIN element identifier from the pairing request message.
[0175] In certain embodiments, the method further comprises computing an authentication value using a hash function, the access token, and the at least one PIN element identifier, and comparing the authentication value with the authentication value received from the network device with the at least one PIN element identifier from the pairing request message.
[0176] In some embodiments, the method further comprises setting up the secure connection by deriving a security key (KDC).
[0177] Embodiments may be practiced in other specific forms. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.

Claims

1 . An apparatus comprising: a processor; and a memory coupled to the processor, the memory comprising instructions executable by the processor to cause the apparatus to: perform a local authentication and registration of personal internet of things network (PIN) elements with preconfigured credentials; transmit, to a PIN application function (AF), a first request message comprising an application session establishment request; and transmit, from the PIN AF, a first response message comprising an application session establishment response.
2. The apparatus of claim 1, wherein the instructions are further executable by the processor to cause the apparatus to transmit, to the PIN AF, a second request message comprising a PIN session binding policy request, wherein the second request message comprises a list of authenticated PIN element IDs and corresponding binding policies.
3. The apparatus of claim 2, wherein the instructions are further executable by the processor to cause the apparatus to receive, from the PIN AF, a second response message comprising a PIN session binding policy response.
4. The apparatus of claim 1, wherein the instructions are further executable by the processor to cause the apparatus to receive a data send request from a locally registered PIN element.
5. The apparatus of claim 4, wherein the instructions are further executable by the processor to cause the apparatus to transmit, to the PIN AF, a third request message comprising a data request message an authentication and key management for applications (AKMA) temporary user equipment (UE) ID (A-TID) of the apparatus, a PIN element with gateway capabilities (PEGC) PIN element ID, a target PIN element ID, a source PIN element ID, or a combination thereof. The apparatus of claim 5, wherein the instructions are further executable by the processor to cause the apparatus to receive, from the PIN AF, a third response message comprising a data response message comprising a direct communication key (KDC) and an access token. The apparatus of claim 6, wherein the instructions are further executable by the processor to cause the apparatus to transmit a data send response to the locally registered PIN element, the data send response comprising the KDC and the access token. The apparatus of claim 1, wherein the apparatus comprises a PIN element with gateway capabilities (PEGC), a PIN element with management capabilities (PEMC), or a combination thereof. An apparatus comprising: a processor; and a memory coupled to the processor, the memory comprising instructions executable by the processor to cause the apparatus to: receive, from a first network device, a first request message comprising an application session establishment request; transmit, to a second network device, a second request message comprising a Naanf_AKMA_ApplicationKey_Get request; receive, from the second network device, a first response message comprising a Naanf_AKMA_ApplicationKey_Get response, wherein the first response message comprises a list of managed personal internet of things network (PIN) element identifiers (IDs) and their corresponding binding policies; and transmit, to the first network device, a second response message comprising an application session establishment response. The apparatus of claim 9, wherein the instructions are further executable by the processor to cause the apparatus to receive, from the first network device, a third request message comprising a PIN session binding policy request, and the third request message comprises a list of authenticated PIN element IDs and corresponding binding policies. The apparatus of claim 10, wherein the instructions are further executable by the processor to cause the apparatus to store the list of authenticated PIN element IDs and their corresponding binding policies. The apparatus of claim 11, wherein the instructions are further executable by the processor to cause the apparatus to match the list of managed PIN element IDs and their corresponding binding polices to the list of authenticated PIN element IDs and their corresponding binding policies. An apparatus comprising: a processor; and a memory coupled to the processor, the memory comprising instructions executable by the processor to cause the apparatus to: perform a local authentication and registration of a personal internet of things network (PIN) element with preconfigured credentials; and send a request to a first network device for sending data to a second device outside a local network. The apparatus of claim 13, wherein the instructions are further executable by the processor to cause the apparatus to receive a pairing request message from the first network device, the pairing request message comprises a direct communication key (KDC), an access token, at least one target PIN element identifier, a PIN element address associated with at least one second network device, or a combination thereof. The apparatus of claim 14, wherein the instructions are further executable by the processor to cause the apparatus to compute an authentication value using a hash function, the access token, and the at least one target PIN element identifier.
PCT/IB2023/052314 2022-03-15 2023-03-10 Establishing an application session corresponding to a pin element WO2023175461A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202263319895P 2022-03-15 2022-03-15
US63/319,895 2022-03-15

Publications (1)

Publication Number Publication Date
WO2023175461A1 true WO2023175461A1 (en) 2023-09-21

Family

ID=85795341

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2023/052314 WO2023175461A1 (en) 2022-03-15 2023-03-10 Establishing an application session corresponding to a pin element

Country Status (1)

Country Link
WO (1) WO2023175461A1 (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210368341A1 (en) * 2020-08-10 2021-11-25 Ching-Yu LIAO Secure access for 5g iot devices and services

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210368341A1 (en) * 2020-08-10 2021-11-25 Ching-Yu LIAO Secure access for 5g iot devices and services

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on Personal Internet of Things (PIoT) networks (Release 18)", 9 June 2021 (2021-06-09), XP052027777, Retrieved from the Internet <URL:https://ftp.3gpp.org/tsg_sa/WG1_Serv/TSGS1_94e_ElectronicMeeting/Docs/S1-211309.zip S1-211309-22859-110_rm.docx> [retrieved on 20210609] *

Similar Documents

Publication Publication Date Title
US11153083B2 (en) Rogue unit detection information
US20220338115A1 (en) Indicating a network for a remote unit
US20230231851A1 (en) Authenticating a device not having a subscription in a network
KR20230101818A (en) Sign-up onboarding using a verified digital identity
US20230105597A1 (en) Re-authentication key generation
US20220104165A1 (en) Indicating a network for a remote unit
WO2023175461A1 (en) Establishing an application session corresponding to a pin element
US20240121088A1 (en) Provisioning server selection in a cellular network
WO2023175541A1 (en) Authentication and registration of personal internet of things network elements
US20240114335A1 (en) Network security based on routing information
US20230199483A1 (en) Deriving a key based on an edge enabler client identifier
US20230284030A1 (en) Uas authentication and security establishment
US20240098494A1 (en) Revocation of uas-related authorization and security information
US20230292114A1 (en) Securing communications between user equipment devices
US20240022908A1 (en) Authentication using a digital identifier for ue access
WO2022130065A1 (en) Application registration with a network
WO2022195461A1 (en) Registration authentication based on a capability
WO2024017486A1 (en) Tunnel establishment for non-seamless wlan offloading
WO2023037220A1 (en) Determining release information based on registration information
WO2023274567A1 (en) Establishing a trust relationship between an application entity and a wireless communication network
CN117223275A (en) Allowing connectivity between UAV and UAV-C

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23714600

Country of ref document: EP

Kind code of ref document: A1