throbber
I|||||||||||||||||||||||||||||||ll||l|||||||l||||||||||||||||||||||||||||||
`
`IJS008l80058B2
`
`(12) United States Patent
`Kitazoe
`
`(10) Patent No.:
`
`(45; Date of Patent:
`
`US 8,180,058 B2
`May 15, 2012
`
`(54) ENCRYPTIOl\i OF THE SCHEDULED UPLINK
`MESSAGE IN RANDOM ACCESS
`PROCEDURE
`
`(75)
`
`Inventor: Masato Kitazoe. Haehiouji (J P)
`
`(73) Assignee: QUALCOMM Incorporated
`
`[ * ) Notice:
`
`Subject to any Klisclaimer. the term o 1‘ this
`patent is extended or adjusted under 35
`U.S.C. 154(1)) by 550 days.
`
`(21) App1.l\lo.: ]2l136,511
`
`(22)
`
`Filed:
`
`Jun. 10. 2008
`
`RA.-\i."£.3rt:l Generation Partnership Project t3GPP). Mobile Compe-
`tence Centre ; 650. Route Des Luciolcs ; F-06921 Sophia-Antipolis
`Cedex;
`I-'rance.vol.
`tsg ran"-WG2 RJ_.2"-.'I'S(3R2.
`58'-.Doctu1ients.no. Kobe.
`20970501-',M:ty
`23.
`2007.
`XP(}50l35l'r'5”.
`
`Japan:
`
`International Search [{cpoI1—-PC'1.-'IIS2tl08r"06?934. International
`Search .-\uthority— -European Patent t')flice- -Dec. I9. 2008.
`Written Opinion -PC'l'."LIS2008.-'06?934.
`International
`Auth-orily—F.uropean Patent OfT|ce—Dec. I9. 2008.
`Nokia. Nokia Siemens Networks. "Upr.la.te on Mobility. Security.
`Random Access Procedures. etc.._" 3G1-’I-’ TSU-RAN Meeting t'i35.
`Iiusan. Korea. RP-(H0494. May 29-Jun. 1. 200?.
`
`Sea.rch
`
`* cited by cxzuniner
`
`(65)
`
`Prior Publication Data
`US 2009f004l246Al
`Feb. 12. 2009
`
`Jacob [..ipir1an
`.-”rimrrry I:‘xcmi:‘.r:er
`(74) /lrmrm3_1:. Agent. or l'"irm
`1). Scott Juneau; Michael
`Del laemer
`
`Related U.S. Application Data
`
`(60) Provisional application No. 601045.465. filed on Jun.
`21. 2007. Ptovisional application No. 60.r‘955.867.
`filed on Aug. 14. 2007.
`
`(51)
`
`Int. Cl.
`1104K 1700
`3801270
`(52) U.S.Cl.
`(58) Field of Classification Search ................. .. 3801270
`See application tile for complete search history.
`
`(2006.01)
`
`(56)
`
`References Cited
`
`U .S. P./\'['liN'I" D()(TUMl€N'1‘S
`200830310396 Al* 1352008 Parketal.
`
`3TU-"350
`
`FOREIGN PATENT DOCUMENTS
`WO2(J08l562?6 A2
`12-""2008
`
`W0
`
`OTHER PUBLICATIONS
`
`“Nokia Siemens Networks: ""1 Zpclalc on Mobility. Security. R£I.I1t.‘l()ll'1
`Access Procedure. etcA”"3G1-‘P Draft; R2-(H2338 Stage 2 Update
`
`zoo T
`
`(57)
`
`ABSTRACT
`
`Systems and methodologies are described that facilitate
`employing a
`random access procedure that
`leverages
`encrypted andfor unencrypted data in a scheduled uplink
`message. A random access preamble can be sent from an
`access terminal
`to a base station. and a random access
`response can he sent from the base station to the access
`terminal. A scheduled transmission message can be sent front
`the access terminal to the base station based upon a grant
`included in the random access response. When contention
`based random access is employed. the scheduled transmis-
`sion mcssagc or a portion thereof can be uncncryptcd. Pur-
`thcr. non—security—critical information can be sent in an unen-
`crypted manner in the scheduled transmission message. while
`security-critical infonnation can be encrypted for transmis-
`sion [e.g.. included in an encrypted portion of the scheduled
`transmission message andfor transmitted in a subsequent
`encrypted norrnal scheduled transrnission message).
`
`42 Claims, 14 Drawing Sheets
`
`ACCESS TERMINAL
`
`RANDOM ACCESS
`REQU ESTER
`
`UNENCRYPTED
`MESSAGE
`GENERATOR
`
`ENC RY PTED
`MES SJ‘GE
`
`GENERATOR
`
`BASE snmon
`
`RANDOM MZCESS
`GRANTOR
`
`MESSAGE sounca
`rnmnrren
`
`SECURITY CONTEXT
`DETERMINER
`
`3”
`
`3"
`
`21‘
`
`APPLE1005
`
`APPLE 1005
`
`1
`
`

`
`U.S. Patent
`
`May 15, 2012
`
`Sheet} of 14
`
`US 8,180,058 B2
`
`104
`
`/—100
`
`FIG.1
`
`2
`
`

`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 2 of 14
`
`US 8,180,058 B2
`
`3N
`
`in
`
`3N
`
`
`
`zo:..<.$n.m<m
`
`
`
`mmauo<EDGE;
`
`,zo._.z<~_o
`
`
`
`mumaommu<mmmE
`
`mmzfizme
`
`
`
`HKHPZOU>.5Summ
`
`
`
`KHZ—Ey—m—.—..W.D
`
`
`
`._<z:§.E.mmmuu<
`
`
`
`mm..._oo<EODZE
`
`mmhmwDOME
`
`nmrimuzmzs
`
`mofimmz
`
`zoeémzmu
`
`5.:..._$._uzw
`
`motmmmzmumwémmz
`
`.2:
`
`man
`
`in
`
`Ndim
`
`3
`
`

`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 3 of 14
`
`US 8,180,058 B2
`
`300 —\
`
`E
`
`302 —\
`
`304 -\
`
`306
`
`X
`
`308
`
`x
`
`RANDOM ACCESS PREAMBLE
`
`RANDOM ACCESS RESPONSE
`
`SCHEDULED TRANSMISSION
`
`-
`CONTENTION RESOLUTION
`
`FIG. 3
`
`4
`
`

`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 4 of 14
`
`US 8,180,058 B2
`
`400\
`
`SERVING
`BS
`
`
`
`RANDOM ACCESS PREAMBLE
`
`RANDOM ACCESS RESPONSE
`
`MESSAGE 3 (UNENCRYPTED
`
`
`
`NON-
`
`SYNCHRONIZEI)
`
`
`
`
`
`402
`
`\\
`
`4[}4—\
`
`406
`
`“\
`
`CONTENTION RESOLUTION
`
`NORMAL SCHEDULED TRANSMISSION (ENCRYPTED
`
`FIG. 4
`
`5
`
`

`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 5 of 14
`
`US 8,180,058 B2
`
`HO COMMAN I
`
`SOURCE
`
`BS
`
`RANDOM ACCESS PREAMBLE
`
`RANDOM ACCESS RESPONSE
`
`
`
`
`
`MESSAGE 3 (UNEN CRYPTED
`
`CONTENTION RESOLUTION
`
`NORNIAL SCHEDULED TRANSMISSION (ENCRYPTED
`
`FIG. 5
`
`510
`
`512
`
`\\
`
`_\.
`
`6
`
`

`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 6 of 14
`
`US 8,180,058 B2
`
`
`
`3Nmomaowmoémmz
`
`¢m—._E.—.Zm—Q~
`
`EN
`
`25
`
`
`
`.5nfl._.ZOUwtmnumm
`
`MMZ_EMHFMD
`
`mmmmam
`
`8.03
`
`mo<mmEa
`
`mo._.<mmz.._._u
`
`cm_,rrEuzm_
`
`moimmzmoBofimmz
`
`mahzmzomm
`
`mofimmz
`
`~—m.—.<Z..m.H<UZOU
`
`in
`
`=31\«
`
`zo:.<.Smmfi.
`
`Sm
`
`
`
`.._<Z:zMH._.mmmuu<
`
`
`
`mmmuo<20:25.
`
`E_§_:o§_
`
`
`
`flohzéUmmmuu<EOQ.Z<¢man
`
`nm,E>¢uzmzD
`
`2.“
`
`EN
`
`vow
`
`So
`
`7
`
`
`
`
`
`
`
`
`
`

`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 7 of 14
`
`US 8,180,058 B2
`
`100 —\
`
`UPLINK NON-
`
`
`
`
`
`SYNCHRONIZED
`
`702 —\
`
`RAN DOM ACCESS PREAMBLE
`
`
`
`RANDOM ACCESS RESPONSE
`
`MESSAGE 3
`(UNENCRYPTED PORTION AND ENCRYPTED PORTION)
`
`NORMAL SCHEDULED TRANSMISSION (ENCRYPTED
`
`CONTENTION RESOLUTIO
`
`FIG. 7
`
`
`
`704 \‘
`
`705 W.
`
`703 ~\
`
`-no
`
`\
`
`8
`
`

`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 8 of 14
`
`US 8,180,058 B2
`
`800 W
`
`TRANSMITTING A RANDOM
`
`802
`
`ACCESS PREAIVIBLE TO A BASE
`
`STATION
`
`RECEIVING A RANDOM ACCESS
`
`RESPONSE FROM THE BASE
`
`STATION BASED UPON THE
`
`RANDOM ACCESS PREAMBLE
`
`TRANSMITTING A SCHEDULED
`TRANSMISSION MESSAGE, WH'ICH
`INCLUDES AT LEAST A PORTION
`
`THAT IS UNENCRYPTED, TO THE
`BASE STATION AS GRANTED BY
`
`THE RANDOM ACCESS RESPONSE
`
`WHEN EMPLOYING CONTENTION
`
`BASED RANDOM ACCESS
`
`804
`
`806
`
`FIG. 8
`
`9
`
`

`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 9 of 14
`
`US 8,180,058 B2
`
`sou T
`
`RECEIVING A RANDOM ACCESS
`
`TERMINAL
`
`PREAMBLE FROM AN ACCESS
`
`TRANSMITTING A RANDOM
`
`ACCESS RESPONSE TO THE
`
`ACCESS TERMINAL BASED UPON
`
`THE RANDOM ACCESS PREAMBLE
`
`902
`
`904
`
`RECEIVING A SCHEDULED
`
`TRANSMISSION MESSAGE, VVHICI-I
`INCLUDES AT LEAST A PORTION
`
`906
`
`THAT IS UNENCRYPTED, FROM
`THE ACCESS TERMINAL WHEN
`
`EMPLOYING CONTENTION BASED
`
`RANDOM. ACCESS
`
`RECOGNIZING AN IDENTITY OF
`
`_ TI-[E ACCESS TERMINAL BASED
`UPON IINFORMATION INCLUDED IN
`
`THE PORTION OF THE SCHEDULED
`
`TRANSMISSION MESSAGE THAT IS
`
`UNENCRYPTED WHEN EMPLOYING
`
`CONTENTION BASED RANDOM
`
`ACCESS
`
`908
`
`END
`
`10
`
`FIG. 9
`
`10
`
`

`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 10 of 14
`
`US 8,180,058 B2
`
`1000 ‘x
`
`ACCESS TERMINAL
`
`UN ENC RY PTED
`
`MESSAGE
`
`GENERATOR
`
`ENC RYPTED
`
`MESSAGE
`
`GENERATOR
`
`TRANSMITTER
`
`MODULATOR
`
`PROCESSOR
`
`MEMORY
`
`FIG. 10
`
`11
`
`11
`
`

`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 11 M14
`
`US 8,180,058 B2
`
`1100i‘
`
`
`
`BASE STATION
`
`1102
`
`11
`
`06
`
`Rx ANTENNAS
`
`1104
`
`
`
`1 1 1
`
`RECEIVER
`
`9
`
`
`
`
`
`
`I 1 16
`
`MEMORY
`
`1 114
`
`PROCESSOR
`
`1118
`
`
`
`
`TERMINAL{S)
`
`ACCESS
`
`
`
`MESSAGE
`
`SOURCE
`IDENTIFIER
`
`SECURITY
`CONTEXT
`DETERMINER
`
`
`1
`
`
`
`1108
`
`TX ANTENNAS
`
`MODULATOR
`
`1 22
`
`FIG. 11
`
`12
`
`12
`
`

`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 12 of 14
`
`US 8,180,058 B2
`
`32
`
`95
`
`._
`
`.—Wmv.................E
`
`5.5KB
`
`uommuuoum
`
`32
`
`Sun
`
`uflaom
`
`jjjjjjjjjjjj
`
`.S$8o.:—5.5km
`
`Na.U—,m
`
`02:2NH
`
`nemmoucum
`
`5.5E.
`
`.Smmouo...m
`
`8:;
`
`~_~_
`
`3.5Na
`
`gammoooam
`
`13
`
`13
`
`
`
`
`

`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 13 of 14
`
`US 8,180,058 B2
`
`
`
`
`
`mo...HZHZOAEOU..<o::.um.§
`
`iuflmeumqm
`
`K8....
`
`.—.<UZ—E..a_UZ_zo_mm:zmz<¢._.
`
`
`nmhmwmozmzaZ4.wm¢m._
`
`
`£0:...zm_zo.=zou
`
`mm..muo<ZOnZ<M<oz_z_<.:_o
`
`HZHZOLEOU..~<U_¢._.UmJH
`
`
`.—.¢—.—._.a..mE<mm._ammo“?
`—>_DDZ<~_<uzazmmcom
`
`ZOSEOU4..mm::._uz_
`
`3dub
`
`wmozmz
`
`omaaamzomd.ozfizmm
`
`
`
`HIP>mn_H._.Z<mU9...ZO:.<._.w
`
`mwém:._.H
`
`mmzoamm:mmmuo<E09243
`
`
`
`nmmfi.ZO_.—.<._.m
`
`wm<mElk.OHzoimom
`
`
`
`20¢:mmzommmm
`
`
`
`UZ_>O1—mEn.—ZNE3
`
`HEPZOLD
`
`mmmuné
`
`m.n::a<mm..
`
`u>_ODZ<¢amm<mZO=.Zm:.ZOU
`
`
`
`mmmuu<20:25.
`
`ZO—._.ZM.HZOUuz_>¢.EZm
`
`
`mmmunéEDGE;:mm<m
`
`
`
`mwmuo<20:25.
`
`mm<m¢.0%nE:.:..zo_m
`
`
`
`ZHE3ZO_._.<.—.m
`
`14
`
`14
`
`

`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 14 of 14
`
`US 8,180,058 B2
`
`
`
`._.Zm_.ZOEZOU.._<U5—._.UH1_H
`
`Z<ozanieowaKO..-
`
`
`
`J<S_m_OZdn.:..:&ozm
`
`nwiwmuzmMDwoémmz
`
`HEP._—OZOE.¢Om
`
`zo_mm_Emz<,m,~amaaaazum
`
`
`4...DZ_>n_:M._.n..3_
`
`a<o_E.om£_
`
`a<o_~Fom.:_
`
`MO:hzmzomzou
`
`
`mo......zmzomzou
`
`>.:u:umm
`
`Z<UZ_N_ZOOUm—M
`
`
`
`mme..._O>._.Fzm&
`
`HXHEZOU
`
`
`
`q<z_Emm._.mmmuu<
`
`zo_mm_Emz5.Hamuanmmum
`
`$9302.,—.<E.Hmofimaz
`
`
`
`
`mmmofi.m=._.._.2.:>>
`
`nmm<m._<z=>Em.n
`mm...7:_=mn=.Uz_
`
`:w.E>muzmz:was
`
`
`
`205%QHEHUWMzofimom
`
`
`
`map2053ammfi.
`
`
`
`
`
`>2:pumaQH>_....fiM._.Hm
`
`PHHHZOU
`
`.._<Z_E»_..w._.mauve.»WI?
`
`anyHO>,_,_._.zmE
`
`nmh<_.oomm<
`
`HIPZOLD
`
`amn_zuou3_
`
`mmaufi.
`
`..<z_Emm._.
`
`:953.3:
`
`ZO:.<u..EO,m7=
`
`amiazozmza
`
`Hflh.mozO_._.~_O.—
`
`nmamoazum
`
`zo.mm:>_mz$_h
`
`mwémmz
`
`,.<u_Ebm_,_m
`
`MOWPZHZOLEOU
`
`am._:am_=um<D7=Z_<._.m_O
`
`zoawzzm23$
`
`
`
`02.93407:moémmz
`
`Z<..w<m..He.
`
`amE>~_uzmz:
`
`
`
`5:.29:.zozaom
`
`
`
`1_<z:,amemmm_.uv<
`
`
`
`wz.>oa.=amZHE3
`
`
`
`nwmgfizo:.z...:zoo
`
`
`
`mmmo..,..<20:24.4.-
`
`15
`
`amozmz
`
`3.0;
`
`15
`
`

`
`US 8,180,058 B2
`
`1
`ENCRYPTION OF THE SCHEDULED UPLINK
`MESSAGE IN RANDOM ACCESS
`PROCEDURE
`
`CROSS-RliFl_iRl£N(7l'i TO Rlil .A'I“I-ii)
`APP! .lCJ\'I‘I()NS
`
`This application claims the benefit of U.S. Provisional
`Patent application Ser. No. 60i’94S.465 entitled “METHOD
`AND APPARATUS FOR ENCRYPTING UPLINK SCHED-
`ULED MESSAGE IN RANDOM ACCESS PROCEDURE"
`which was filed Jun. 21, 2007 and US. Provisional Patent
`application Ser. No. 601955.867 entitled “A METHOD AND
`APPARATUS FOR t7.N(.‘RYP'l‘lNG U PLINK SCI It'll)-
`UI..lI~ZD MlF.SSAGl5'. IN RANDOM ACCIESS PRO(.‘l-3l)U RE”
`
`which was filed Aug. 14, 2007. The entirety of the aforemen-
`tioned application is herein incorporated by reference.
`
`BACKGROUND
`
`1. Field
`
`The following description relates generally to wireless
`communications.
`and more particularly to controlling
`encryption of uplink messages in a random access procedure
`in a wireless communication system.
`II. Background
`Wireless communication systems are widely deployed to
`provide various types of communication: for instance. voice
`andfor data can be provided via such wireless communication
`systems. A typical wireless communication system, or net-
`work. can provide mttltiple users access to one or more shared
`resources (e.g.. bandwidth. transmit power, . .
`. ). For instance,
`a system can use a variety of multiple access techniques such
`as Frequency Division Multiplexing (FDM), Time Division
`Multiplexing (TDM). Code Division Multiplexing (CDM),
`Orthogonal Frequency Division Multiplexing (OFDM}. and
`others.
`
`Generally. wireless multiple-access conununication sys-
`tems can simultaneously support communication for multiple
`access terminals. Each access terminal can communicate
`with one or more base stations via transmissions on forward
`
`and reverse links. The forward link (or downlink) refers to the
`communication link front base stations to access terminals.
`and the reverse link (or uplink} refers to the communication
`link from access terminals to base stations. This communica-
`
`tion link can be established via a single-in-single-out. mul-
`tiple-in-single-out or a multiple-in-multiple-out (MIMO)
`system.
`M]MO systems commonly employ multiple (NT) transmit
`antennas and multiple (NR) receive antennas for data trans-
`mission. A MIMO channel formed by the Nptransmit and NR
`receive antemias can be decomposed into Ns independent
`channels. which can be referred to as spatial channels. where
`NS§{NrNR}. [Each of the NS independent channels corre-
`sponds to a dimension. Moreover. MIMO systems can pro-
`vide improved performance (e.g._.
`increased spectral effi-
`ciency. higher throughput aitdfor greater reliability) if the
`additional dimensionalities created by the multiple transmit
`and receive antennas are utilized.
`
`MIMO systems can support various duplexing techniques
`to divide forward and reverse link communications over a
`common physical medium. For instance. frequency division
`duplex (FDD) systems can utilize disparate frequency regions
`for forward and reverse link communications. Further, in time
`division duplex fl‘I)l)) systems, forward and reverse link
`communications can employ a common frequency region so
`
`2
`
`that the reciprocity principle allows estimation ofthe forward
`link channel from reverse link channel.
`
`Wireless communication systems oftentimes employ one
`or more base stations that provide a coverage area. A typical
`base station can transmit multiple data streams for broadcast.
`multicast andforunicast services. wherein a data stream may
`be a stream of data that can be of independent reception
`interest to an access terminal. An access terminal within the
`
`1U
`
`coverage area ofsuch base station can be employed to receive
`one. more than one, or all the data streams carried by the
`composite stream. Likewise. an access terminal can transmit
`data to the base station or another access terminal.
`
`An access terminal can utilize a random access procedure
`to gain access to a system (e.g. to obtain allocation of a
`communications channel andlor associated resources, .
`.
`. ).
`For instance. the random access procedure can be used for
`initial access to the system. handover from a source base
`station to a target base station. uplink timing synchronization
`for data transfer. and the like. Typically. an access terminal
`sends a random access preamble on the uplink when the
`access terminal desires to gain access to the system. A base
`station can receive the random access preamble and respond
`with a random access response sent over the downlink. Based
`upon the random access response. the access terminal can
`attempt to send a scheduled transmission over the uplink to
`the base station. However, in the case of contention based
`random access, the base station can be unaware ofan identity
`of the access terminal attempting to transmit the scheduled
`transmission. Hence. conventional techniques oftentimes fail
`to account for the base station being unable to determine an
`identity of a source from which the scheduled transmission
`originates, which can be particularly problematic when such
`scheduled transmission is encrypted.
`
`SUMMARY
`
`The following presents a simplified summary of one or
`more embodiments in order to provide a basic understanding
`ofsucli embodiments. This summary is not an extensive over-
`view of all contemplated embodiments, and is intended to
`neither identify key or critical elements of all embodiments
`nor delineate the scope of any or all embodiments. Its sole
`purpose is to present some concepts of one or n1ore en1bodi—
`ments iii a simplified form as a prelude to the more detailed
`description that is presented later.
`In accordance with one or more embodiments and corre-
`
`sponding disclosure thereof, various aspects are described in
`connection with facilitating employment of a random access
`procedure that leverages encrypted andfor unencrypted data
`in a scheduled uplink message. A random access preamble
`can be sent from an access terminal to a base station. and a
`random access response can be sent from the base station to
`the access terminal . A scheduled transmission message can be
`sent from the access terminal to the base station based upon a
`grant included in the random access response. When conten-
`tion based random access is employed, the scheduled trans-
`mission message or a portion thereof can be unencrypted.
`Further, non-security—critical information can be sent in an
`unencrypted manner in the scheduled transmission message.
`while security-critical information can be encrypted for trans-
`inission (e.g.. included in an encrypted portion of tl1e sched-
`uled transmission message andior transmitted in a subsequent
`encrypted normal scheduled transmission message).
`According to related aspects. a method that facilitates
`employing a random access procedure in a wireless commu-
`nication environment is described herein. The method can
`
`include transmitting a random access preamble to a base
`
`3U
`
`4U
`
`45
`
`50
`
`55
`
`60
`
`65
`
`16
`
`16
`
`

`
`3
`
`4
`
`US 8,180,058 B2
`
`station. Further, the method can comprise receiving a random
`access response front tlte base station based upon the random
`access preamble. Moreover. the method cart include transntit-
`ting a sclteduled transmission message, which includes at
`least a portion that
`is unencryptcd. to the base station as
`granted by the random access response when employing con-
`tention based random access.
`
`Another aspect relates to a wireless contmunications appa-
`ratus. The wireless ootttmunications apparatus can include a
`mentory that retains instructions related to transmitting a
`random access preamble to a base station for at least one of
`initial access. re-entry from non-synchronized state. or han-
`dover from a source base station to tlte base station, receiving
`a random access response from the base station based upon
`the random access preamble. transmitting a scheduled trans-
`mission message. which includes at least a portion that is
`unencrypted. to the base station as granted by the random
`access response when employing contention based random
`access. and receiving a contention resolution message from
`the base station in response to the scheduled transntission
`message. Further. the wireless communications apparatus
`can include a processor. coupled to the memory. configured to
`execute the instructions retained in the memory.
`Yet another aspect relates to a wireless contmunications
`apparatus that enables utilizing a randont access procedure itt
`a wireless cornntunication environment. The wireless com-
`
`ntunications apparatus can include means for sending a ran-
`dom access preamble that includes a common random access
`signature to a base station when employing contention based
`random access. Moreover.
`the wireless communications
`apparatus can include means for obtaining a random access
`response front the base station based upon the random access
`preamble. Further. the wireless communications apparatus
`can include means For sending a scheduled transmission
`including at least an unencrypted portion to the base station as
`granted by tlte random access response when employing con-
`tention based random access.
`Still another aspect relates to a computer program product
`that can comprise a computer-readable medium. The com-
`puter-readable medium Catt include code for transmitting a
`random access preamble to a base station. Further. the com-
`puter~readable medium can include code for receiving a ran-
`dom access response from the base station based upon the
`random access preamble. Moreover. the computer-readable
`medium cart comprise code for transmitting a scheduled
`transmission including at least art tutencrypted portion to the
`base station as granted by the random access response when
`employing contention based random access.
`In accordance with another aspect. an apparatus in a wire-
`less communication system can include a processor, wherein
`the processor can be configured to transmit a random access
`preamble to a base station. The processor can also be config-
`ured to receive a random access response front the base sta-
`tion based upon the random access preamble. Further. the
`processor can be configured to transmit a scheduled transmis-
`sion including at least an unencrypted portion to the base
`station as granted by the random access response when
`employing contention based random access.
`According to other aspects. a method that facilitates deci-
`phering data obtained during a random access procedure in a
`wireless cotruttunication environment is described herein.
`
`The method can include receiving a random access preamble
`from an access tenninal. Further. the method can include
`transmitting a random access response to the access terminal
`based upon the random access preamble. The method cart also
`comprise receiving a sclteduled transmission message. which
`includes at least a portion that is unencryptcd, from the access
`
`5
`
`1D
`
`1)
`
`EU
`
`25
`
`3U
`
`35
`
`4f]
`
`45
`
`50
`
`55
`
`60
`
`65
`
`terminal when employing contention based random access.
`Moreover. the method cart include recognizing an identity of
`the access terminal based upon information included irt the
`portion of the scheduled transmission message that is unen-
`cryptcd when employing contention based random access.
`Yet another aspect relates to a wireless communications
`apparatus that can include a ntemory that retains instructions
`related to receiving a random access preamble front an access
`terminal. transmitting a random access response to the access
`tenninal based upon the random access preamble. receiving a
`scheduled transmission message, which includes at least a
`portion that is unencrypted. from the access terminal when
`employing contention based random access, recognizing an
`identity of the access terminal based upon infomtation
`included in the portion of the scheduled transmission mes-
`sage that is unencrypted when employing contention based
`random access. and determining a security context associated
`with the access terminal based upon the recognized identity
`ofthe access terminal. Further. the wireless comnntnications
`apparatus cart comprise a processor, coupled to the memory.
`configured to execute the instructions retained in the memory.
`Another aspect relates to a wireless comnttutications appa-
`ratus that enables employing a random access procedure in a
`wireless contmunicatiort environment. The wireless comntu-
`
`nications apparatus can include means for obtaining a sched-
`uled transntission message including at least an unencrypted
`portion from the access terminal when employing contention
`based random access. The wireless communications appara-
`tus can further include means for recognizing an identity of
`the access terminal based upon irtfonnation included iii the
`unencrypted portion of the scheduled transmission message.
`The wireless comntuttications apparatus can also include
`means for retrieving a security context associated with the
`access terminal based upon the recognized identity of the
`access terminal. Moreover.
`the wireless communications
`apparatus cart include means for deciphering art encrypted,
`normal scheduled transmission message or encrypted portion
`of the scheduled transmission message that
`includes the
`unencrypted portion received front the access terminal based
`upon the retrieved security context.
`Still another aspect relates to a computer program product
`that can comprise a computer-readable medium. The com-
`puter—readable medium can include code for obtaining a
`scheduled transmission message including at least art unen-
`crypted portion front the access terminal when employing
`contention based random access. The computer-readable
`medium can also include code lor recognizing an identity of
`the access terminal based upon information included in the
`uttencrypted portion of the scheduled transmission message.
`The computer—readable medium can further include code for
`retrieving a security context associated with the access tenni-
`rtal based upon the recognized identity of the access terminal.
`Moreover. the contputer-readable medium cart include code
`for deciphering an encrypted. normal scheduled transmission
`message or encrypted portion of the scheduled transmission
`message that includes the unencrypted portion received front
`the access terminal based upon the retrieved security context.
`In accordance with another aspect. an apparatus in a wire-
`less communication system can include a processor, wherein
`the processor can he configured to receive a schedttled traits-
`mission message including at least an unencrypted portion
`from the access tertttinal when employing contention based
`random access; recognize an identity of the access terminal
`based upon information included in the unencrypted portion
`of the scheduled transmission message; retrieve a security
`context associated with the access terminal based upon the
`recognized identity of the access tenninal; and decipher an
`
`17
`
`17
`
`

`
`5
`
`6
`
`US 8,180,058 B2
`
`scheduled transmission message or
`encrypted, normal
`encrypted por1ion of the scheduled transmission message that
`includes the unencrypted portion received from the access
`terminal based upon the retrieved security context.
`To the accomplishment of the foregoing and related ends.
`the one or 111ore embodiments comprise the features herein-
`after fully described and particularly pointed out
`in the
`claims. The following description and the annexed drawings
`set forth in detail certain illustrative aspects ofthe one or t11ore
`embodiments. These aspects are indicative, however. of but a
`few of the various ways in which the principles of various
`embodiments can be employed and the described embodi-
`ments are intended to include all such aspects and their
`equivalents.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is an illustration of a wireless communication sys-
`tem in accordance with various aspects set forth herein.
`FIG. 2 is an illustration of an example system that controls
`encryption ofuplink messages in a random access procedure.
`FIG. 3 is an illustration ofau example signaling diagram of
`a basic random access procedure i11 accordance with various
`aspects of the subject disclosure.
`FIG. 4 is an illustration ofan example signaling diagram of
`uplink Radio Resource Control (RRC) message transmission
`by a 11011-Syl1Cl]l'0[1l’/’.Cl:l access terminal in accordance with
`various aspects of the subject disclosure.
`FIG. 5 is an illustration of an example signaling diagram
`showing a handover scenario in accordance with various
`aspects of the subject disclosure.
`FIG. 6 is an illustration of an example system that sends
`encrypted andfor unencrypted messages as part ofa random
`access procedure.
`FIG. 7 is an illustration ofan example signaling diagram of
`a random access procedure that communicates encrypted and
`unencrypted information in message 3 in accordance with
`various aspects of the subject disclosure.
`FIG. 8 is an illustration of an example methodology that
`facilitates employing a random access procedure in a wireless
`conuuunication environment.
`
`1"‘IG. 9 is an illustration of an example methodology that
`facilitates deciphering data obtained during a random access
`procedure in a wireless comniunication environment.
`FIG. I E] is an illustration of an example access terminal that
`transmits encrypted andior unencryptcd scheduled uplink
`messages in a wireless coninitutication system.
`FIG. 11 is an illustration ofau example system that evalu-
`ates uncncrypted andi"tJr encrypted scheduled messages
`received over an uplink during a random access procedure in
`a wireless corrununication environment.
`FIG. 12 is an illustration of an example wireless network
`environment that can be employed in conjunction with the
`various systems and methods described herein.
`FIG. 13 is an illustration ofan example system that enables
`utilizing a random access procedure in a wireless connnuni-
`cation environment.
`
`FIG. 14 is an illustration ofa11 example system that enables
`employing a random access procedure in a wireless commu-
`nication environment.
`
`IJIEZTAILFID DESCRIPTION
`
`Various embodinients are now described with reference to
`
`the drawings, wherein like reference numerals are used to
`refer to like elements throughout. In the following descrip-
`tion, for purposes of explanation. numerous specific details
`
`1U
`
`3t]
`
`4t]
`
`45
`
`50
`
`55
`
`60
`
`65
`
`are set forth i11 order to provide a thorough understanding of
`one or more embodiments. It may be evident. however, that
`such ernbodirnent(s) may be practiced without these specific
`details. In other instances. well-known structures and devices
`are shown in block diagram form in order to facilitate describ-
`ing one or more embodiments.
`As used in this application. the temis “component.“ “mod-
`ule.“ “system._" and the like are intended to refer to a com-
`puter-related entity. either liardware, firmware. a combination
`ofliardware and software. software. or software in execution.
`For example_. a component can be. but is not limited to being,
`a process rutuiing on a processor. a processor. an object. an
`executable, a thread of execution. a program, andfor a com-
`puter. By way ofillustration. both an application running on
`a computing device and the computing device can be a com-
`ponent. One or more components can reside within a process
`andfor thread of execution and a component can be local ized
`on one computer andfor distributed between two or more
`computers. In addition. these components can execute from
`various computer readable media having various data struc-
`tures stored thereon. The components can conununicate by
`way of local andfor remote processes such as in accordance
`with a signal having one or more data packets (c.g._. data from
`one component interacting with another component in a local
`system. distributed system. andfor across a network such as
`the Internet with other systems by way of the signal).
`The techniques described herein can he used for various
`wireless cornnttunication systems such as code division mul-
`tiple access
`(CDMA),
`time division multiple access
`(’l‘fJMA).
`frequency division multiple access (I-‘IJM./-\),
`orthogonal frequency division multiple access (OFDM_A]_.
`single carrier-frequency division multiple access
`(SC-
`FDMA) and other systems. The terms “system" and “net-
`work” are often used interchangeably. A CDMA system can
`irnplenient a radio technology such as Universal Terrestrial
`Radio Access {UTRA]_. C DMA2000. etc. UTRA includes
`Wideband-CDMA (W-C‘DMA} and other variants ofCDMA.
`CDMAZUOO covers IS-2000. IS-95 and IS-856 standards. A
`TDMA system can implement a radio teclmology such as
`Global System for Mobile Communications (GSM). An
`OFDMA system can implement a radio technology such as
`Evolved UTRA (E—UTRA)_. Ultra Mobile Broadband
`(UMB), IEEE802.l 1 (Wi—Fi). IEEE 802.16 (WEMAX), IEEE
`802.20. Flash—OFDM. etc. UTRA and E-UTRA are part of
`Universal Mobile Telecommunication System {UMTS].
`3GPP Long Term [Evolution [l..TE} is an upcoming release of
`UMTS that uses E-UTRA. which employs OFDMA on the
`downlink and SC -FDMA on the uplink.
`Single carrier frequency division multiple access (SC-
`FDMA} utilizes single carrier modulation and frequency
`domain equalization. SCFDMA has similar performance
`and essentially the same overall complexity as those of an
`OFDMA system. A SC-FDMA signal has lower peal<-to-
`average power ratio [PAPR) because of its inherent single
`carrier structure. SC-FDMA can be used. for instance.
`in
`uplink communications where Iower PAPR greatly benefits
`access terminals in terms of transmit power efficiency.
`Accordingly. SC —FDMA can be implemented as an upliuk
`multiple access scheme in 9-GPP Long Term [Evolution (I.’I‘l£]
`or Evolved UTRA.
`Furthermore. various embodiments are described herein in
`connection with an access terminal. An access terminal can
`also be called a system. subscriber unit. subscriber station,
`mobile station, mobile. remote station, remote terminal.
`mobile device. user terminal, terminal. wireless communica-
`tion device. uscr agent. user device. or user equipment {Ul.i).
`An access terminal can be a cellular telephone. a cordless
`
`18
`
`18
`
`

`
`7
`
`8
`
`US 8,180,058 B2
`
`telephone. a Session Initiation Protocol (SIP) pho11e. a wire-
`less local loop (WLL) station, a personal digital assistant
`(PDA), a handheld device having wireless connection capa-
`bility. computing device, or other processing device con-
`nected to a wireless modem. Moreover. various embodiments
`are described herein in connection with a base station. A base
`station can be utilized for communicating with access tenni-
`nal(s_‘J and can also be referred to as an access point. Node B.
`Evolved Node 13 (eNodeB) or some other tenninology.
`Moreover. various aspects or features described herein can
`be implemented as a 1nethod_. apparatus, or article of mariti-
`facture using standard programming andfor engineering tech-
`niques. The term “article of manufacture" as used herein is
`intended to encompass a computer program accessible from
`arty computer-readable device. carrier. or media. For
`example. computer-readable media can include but are not
`limited to magnetic storage devices {eg. hard disk. floppy
`disk, magnetic strips, etc.)_. optical disks (e.g._. compact disk
`(CD). digital versatile disk (DVD). etc.). smart cards. and
`flash memory devices (eg. I.El’ROM. card. stick, key drive.
`etc.). Additionally, various storage media described herein
`can represent one or more devices andfor other machine-
`readable media for storing infonnation. “the term “machine-
`readable medium” can include, without being limited to.
`wireless channels and various other media capable of storing.
`containing. andfor canying instruction(s] andfor data.
`Referring now to FIG. 1. a wireless communication system
`100 is illustrated in accordance with various emboditnents
`
`presented herein. System 100 comprises a base station 102
`that can include multiple antenna groups. For example. one
`antenna group can include antennas 104 and 106. another
`g

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket