`
`IJS008l80058B2
`
`(12) United States Patent
`Kitazoe
`
`(10) Patent No.:
`
`(45; Date of Patent:
`
`US 8,180,058 B2
`May 15, 2012
`
`(54) ENCRYPTIOl\i OF THE SCHEDULED UPLINK
`MESSAGE IN RANDOM ACCESS
`PROCEDURE
`
`(75)
`
`Inventor: Masato Kitazoe. Haehiouji (J P)
`
`(73) Assignee: QUALCOMM Incorporated
`
`[ * ) Notice:
`
`Subject to any Klisclaimer. the term o 1‘ this
`patent is extended or adjusted under 35
`U.S.C. 154(1)) by 550 days.
`
`(21) App1.l\lo.: ]2l136,511
`
`(22)
`
`Filed:
`
`Jun. 10. 2008
`
`RA.-\i."£.3rt:l Generation Partnership Project t3GPP). Mobile Compe-
`tence Centre ; 650. Route Des Luciolcs ; F-06921 Sophia-Antipolis
`Cedex;
`I-'rance.vol.
`tsg ran"-WG2 RJ_.2"-.'I'S(3R2.
`58'-.Doctu1ients.no. Kobe.
`20970501-',M:ty
`23.
`2007.
`XP(}50l35l'r'5”.
`
`Japan:
`
`International Search [{cpoI1—-PC'1.-'IIS2tl08r"06?934. International
`Search .-\uthority— -European Patent t')flice- -Dec. I9. 2008.
`Written Opinion -PC'l'."LIS2008.-'06?934.
`International
`Auth-orily—F.uropean Patent OfT|ce—Dec. I9. 2008.
`Nokia. Nokia Siemens Networks. "Upr.la.te on Mobility. Security.
`Random Access Procedures. etc.._" 3G1-’I-’ TSU-RAN Meeting t'i35.
`Iiusan. Korea. RP-(H0494. May 29-Jun. 1. 200?.
`
`Sea.rch
`
`* cited by cxzuniner
`
`(65)
`
`Prior Publication Data
`US 2009f004l246Al
`Feb. 12. 2009
`
`Jacob [..ipir1an
`.-”rimrrry I:‘xcmi:‘.r:er
`(74) /lrmrm3_1:. Agent. or l'"irm
`1). Scott Juneau; Michael
`Del laemer
`
`Related U.S. Application Data
`
`(60) Provisional application No. 601045.465. filed on Jun.
`21. 2007. Ptovisional application No. 60.r‘955.867.
`filed on Aug. 14. 2007.
`
`(51)
`
`Int. Cl.
`1104K 1700
`3801270
`(52) U.S.Cl.
`(58) Field of Classification Search ................. .. 3801270
`See application tile for complete search history.
`
`(2006.01)
`
`(56)
`
`References Cited
`
`U .S. P./\'['liN'I" D()(TUMl€N'1‘S
`200830310396 Al* 1352008 Parketal.
`
`3TU-"350
`
`FOREIGN PATENT DOCUMENTS
`WO2(J08l562?6 A2
`12-""2008
`
`W0
`
`OTHER PUBLICATIONS
`
`“Nokia Siemens Networks: ""1 Zpclalc on Mobility. Security. R£I.I1t.‘l()ll'1
`Access Procedure. etcA”"3G1-‘P Draft; R2-(H2338 Stage 2 Update
`
`zoo T
`
`(57)
`
`ABSTRACT
`
`Systems and methodologies are described that facilitate
`employing a
`random access procedure that
`leverages
`encrypted andfor unencrypted data in a scheduled uplink
`message. A random access preamble can be sent from an
`access terminal
`to a base station. and a random access
`response can he sent from the base station to the access
`terminal. A scheduled transmission message can be sent front
`the access terminal to the base station based upon a grant
`included in the random access response. When contention
`based random access is employed. the scheduled transmis-
`sion mcssagc or a portion thereof can be uncncryptcd. Pur-
`thcr. non—security—critical information can be sent in an unen-
`crypted manner in the scheduled transmission message. while
`security-critical infonnation can be encrypted for transmis-
`sion [e.g.. included in an encrypted portion of the scheduled
`transmission message andfor transmitted in a subsequent
`encrypted norrnal scheduled transrnission message).
`
`42 Claims, 14 Drawing Sheets
`
`ACCESS TERMINAL
`
`RANDOM ACCESS
`REQU ESTER
`
`UNENCRYPTED
`MESSAGE
`GENERATOR
`
`ENC RY PTED
`MES SJ‘GE
`
`GENERATOR
`
`BASE snmon
`
`RANDOM MZCESS
`GRANTOR
`
`MESSAGE sounca
`rnmnrren
`
`SECURITY CONTEXT
`DETERMINER
`
`3”
`
`3"
`
`21‘
`
`APPLE1005
`
`APPLE 1005
`
`1
`
`
`
`U.S. Patent
`
`May 15, 2012
`
`Sheet} of 14
`
`US 8,180,058 B2
`
`104
`
`/—100
`
`FIG.1
`
`2
`
`
`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 2 of 14
`
`US 8,180,058 B2
`
`3N
`
`in
`
`3N
`
`
`
`zo:..<.$n.m<m
`
`
`
`mmauo<EDGE;
`
`,zo._.z<~_o
`
`
`
`mumaommu<mmmE
`
`mmzfizme
`
`
`
`HKHPZOU>.5Summ
`
`
`
`KHZ—Ey—m—.—..W.D
`
`
`
`._<z:§.E.mmmuu<
`
`
`
`mm..._oo<EODZE
`
`mmhmwDOME
`
`nmrimuzmzs
`
`mofimmz
`
`zoeémzmu
`
`5.:..._$._uzw
`
`motmmmzmumwémmz
`
`.2:
`
`man
`
`in
`
`Ndim
`
`3
`
`
`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 3 of 14
`
`US 8,180,058 B2
`
`300 —\
`
`E
`
`302 —\
`
`304 -\
`
`306
`
`X
`
`308
`
`x
`
`RANDOM ACCESS PREAMBLE
`
`RANDOM ACCESS RESPONSE
`
`SCHEDULED TRANSMISSION
`
`-
`CONTENTION RESOLUTION
`
`FIG. 3
`
`4
`
`
`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 4 of 14
`
`US 8,180,058 B2
`
`400\
`
`SERVING
`BS
`
`
`
`RANDOM ACCESS PREAMBLE
`
`RANDOM ACCESS RESPONSE
`
`MESSAGE 3 (UNENCRYPTED
`
`
`
`NON-
`
`SYNCHRONIZEI)
`
`
`
`
`
`402
`
`\\
`
`4[}4—\
`
`406
`
`“\
`
`CONTENTION RESOLUTION
`
`NORMAL SCHEDULED TRANSMISSION (ENCRYPTED
`
`FIG. 4
`
`5
`
`
`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 5 of 14
`
`US 8,180,058 B2
`
`HO COMMAN I
`
`SOURCE
`
`BS
`
`RANDOM ACCESS PREAMBLE
`
`RANDOM ACCESS RESPONSE
`
`
`
`
`
`MESSAGE 3 (UNEN CRYPTED
`
`CONTENTION RESOLUTION
`
`NORNIAL SCHEDULED TRANSMISSION (ENCRYPTED
`
`FIG. 5
`
`510
`
`512
`
`\\
`
`_\.
`
`6
`
`
`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 6 of 14
`
`US 8,180,058 B2
`
`
`
`3Nmomaowmoémmz
`
`¢m—._E.—.Zm—Q~
`
`EN
`
`25
`
`
`
`.5nfl._.ZOUwtmnumm
`
`MMZ_EMHFMD
`
`mmmmam
`
`8.03
`
`mo<mmEa
`
`mo._.<mmz.._._u
`
`cm_,rrEuzm_
`
`moimmzmoBofimmz
`
`mahzmzomm
`
`mofimmz
`
`~—m.—.<Z..m.H<UZOU
`
`in
`
`=31\«
`
`zo:.<.Smmfi.
`
`Sm
`
`
`
`.._<Z:zMH._.mmmuu<
`
`
`
`mmmuo<20:25.
`
`E_§_:o§_
`
`
`
`flohzéUmmmuu<EOQ.Z<¢man
`
`nm,E>¢uzmzD
`
`2.“
`
`EN
`
`vow
`
`So
`
`7
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 7 of 14
`
`US 8,180,058 B2
`
`100 —\
`
`UPLINK NON-
`
`
`
`
`
`SYNCHRONIZED
`
`702 —\
`
`RAN DOM ACCESS PREAMBLE
`
`
`
`RANDOM ACCESS RESPONSE
`
`MESSAGE 3
`(UNENCRYPTED PORTION AND ENCRYPTED PORTION)
`
`NORMAL SCHEDULED TRANSMISSION (ENCRYPTED
`
`CONTENTION RESOLUTIO
`
`FIG. 7
`
`
`
`704 \‘
`
`705 W.
`
`703 ~\
`
`-no
`
`\
`
`8
`
`
`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 8 of 14
`
`US 8,180,058 B2
`
`800 W
`
`TRANSMITTING A RANDOM
`
`802
`
`ACCESS PREAIVIBLE TO A BASE
`
`STATION
`
`RECEIVING A RANDOM ACCESS
`
`RESPONSE FROM THE BASE
`
`STATION BASED UPON THE
`
`RANDOM ACCESS PREAMBLE
`
`TRANSMITTING A SCHEDULED
`TRANSMISSION MESSAGE, WH'ICH
`INCLUDES AT LEAST A PORTION
`
`THAT IS UNENCRYPTED, TO THE
`BASE STATION AS GRANTED BY
`
`THE RANDOM ACCESS RESPONSE
`
`WHEN EMPLOYING CONTENTION
`
`BASED RANDOM ACCESS
`
`804
`
`806
`
`FIG. 8
`
`9
`
`
`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 9 of 14
`
`US 8,180,058 B2
`
`sou T
`
`RECEIVING A RANDOM ACCESS
`
`TERMINAL
`
`PREAMBLE FROM AN ACCESS
`
`TRANSMITTING A RANDOM
`
`ACCESS RESPONSE TO THE
`
`ACCESS TERMINAL BASED UPON
`
`THE RANDOM ACCESS PREAMBLE
`
`902
`
`904
`
`RECEIVING A SCHEDULED
`
`TRANSMISSION MESSAGE, VVHICI-I
`INCLUDES AT LEAST A PORTION
`
`906
`
`THAT IS UNENCRYPTED, FROM
`THE ACCESS TERMINAL WHEN
`
`EMPLOYING CONTENTION BASED
`
`RANDOM. ACCESS
`
`RECOGNIZING AN IDENTITY OF
`
`_ TI-[E ACCESS TERMINAL BASED
`UPON IINFORMATION INCLUDED IN
`
`THE PORTION OF THE SCHEDULED
`
`TRANSMISSION MESSAGE THAT IS
`
`UNENCRYPTED WHEN EMPLOYING
`
`CONTENTION BASED RANDOM
`
`ACCESS
`
`908
`
`END
`
`10
`
`FIG. 9
`
`10
`
`
`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 10 of 14
`
`US 8,180,058 B2
`
`1000 ‘x
`
`ACCESS TERMINAL
`
`UN ENC RY PTED
`
`MESSAGE
`
`GENERATOR
`
`ENC RYPTED
`
`MESSAGE
`
`GENERATOR
`
`TRANSMITTER
`
`MODULATOR
`
`PROCESSOR
`
`MEMORY
`
`FIG. 10
`
`11
`
`11
`
`
`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 11 M14
`
`US 8,180,058 B2
`
`1100i‘
`
`
`
`BASE STATION
`
`1102
`
`11
`
`06
`
`Rx ANTENNAS
`
`1104
`
`
`
`1 1 1
`
`RECEIVER
`
`9
`
`
`
`
`
`
`I 1 16
`
`MEMORY
`
`1 114
`
`PROCESSOR
`
`1118
`
`
`
`
`TERMINAL{S)
`
`ACCESS
`
`
`
`MESSAGE
`
`SOURCE
`IDENTIFIER
`
`SECURITY
`CONTEXT
`DETERMINER
`
`
`1
`
`
`
`1108
`
`TX ANTENNAS
`
`MODULATOR
`
`1 22
`
`FIG. 11
`
`12
`
`12
`
`
`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 12 of 14
`
`US 8,180,058 B2
`
`32
`
`95
`
`._
`
`.—Wmv.................E
`
`5.5KB
`
`uommuuoum
`
`32
`
`Sun
`
`uflaom
`
`jjjjjjjjjjjj
`
`.S$8o.:—5.5km
`
`Na.U—,m
`
`02:2NH
`
`nemmoucum
`
`5.5E.
`
`.Smmouo...m
`
`8:;
`
`~_~_
`
`3.5Na
`
`gammoooam
`
`13
`
`13
`
`
`
`
`
`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 13 of 14
`
`US 8,180,058 B2
`
`
`
`
`
`mo...HZHZOAEOU..<o::.um.§
`
`iuflmeumqm
`
`K8....
`
`.—.<UZ—E..a_UZ_zo_mm:zmz<¢._.
`
`
`nmhmwmozmzaZ4.wm¢m._
`
`
`£0:...zm_zo.=zou
`
`mm..muo<ZOnZ<M<oz_z_<.:_o
`
`HZHZOLEOU..~<U_¢._.UmJH
`
`
`.—.¢—.—._.a..mE<mm._ammo“?
`—>_DDZ<~_<uzazmmcom
`
`ZOSEOU4..mm::._uz_
`
`3dub
`
`wmozmz
`
`omaaamzomd.ozfizmm
`
`
`
`HIP>mn_H._.Z<mU9...ZO:.<._.w
`
`mwém:._.H
`
`mmzoamm:mmmuo<E09243
`
`
`
`nmmfi.ZO_.—.<._.m
`
`wm<mElk.OHzoimom
`
`
`
`20¢:mmzommmm
`
`
`
`UZ_>O1—mEn.—ZNE3
`
`HEPZOLD
`
`mmmuné
`
`m.n::a<mm..
`
`u>_ODZ<¢amm<mZO=.Zm:.ZOU
`
`
`
`mmmuu<20:25.
`
`ZO—._.ZM.HZOUuz_>¢.EZm
`
`
`mmmunéEDGE;:mm<m
`
`
`
`mwmuo<20:25.
`
`mm<m¢.0%nE:.:..zo_m
`
`
`
`ZHE3ZO_._.<.—.m
`
`14
`
`14
`
`
`
`U.S. Patent
`
`May 15, 2012
`
`Sheet 14 of 14
`
`US 8,180,058 B2
`
`
`
`._.Zm_.ZOEZOU.._<U5—._.UH1_H
`
`Z<ozanieowaKO..-
`
`
`
`J<S_m_OZdn.:..:&ozm
`
`nwiwmuzmMDwoémmz
`
`HEP._—OZOE.¢Om
`
`zo_mm_Emz<,m,~amaaaazum
`
`
`4...DZ_>n_:M._.n..3_
`
`a<o_E.om£_
`
`a<o_~Fom.:_
`
`MO:hzmzomzou
`
`
`mo......zmzomzou
`
`>.:u:umm
`
`Z<UZ_N_ZOOUm—M
`
`
`
`mme..._O>._.Fzm&
`
`HXHEZOU
`
`
`
`q<z_Emm._.mmmuu<
`
`zo_mm_Emz5.Hamuanmmum
`
`$9302.,—.<E.Hmofimaz
`
`
`
`
`mmmofi.m=._.._.2.:>>
`
`nmm<m._<z=>Em.n
`mm...7:_=mn=.Uz_
`
`:w.E>muzmz:was
`
`
`
`205%QHEHUWMzofimom
`
`
`
`map2053ammfi.
`
`
`
`
`
`>2:pumaQH>_....fiM._.Hm
`
`PHHHZOU
`
`.._<Z_E»_..w._.mauve.»WI?
`
`anyHO>,_,_._.zmE
`
`nmh<_.oomm<
`
`HIPZOLD
`
`amn_zuou3_
`
`mmaufi.
`
`..<z_Emm._.
`
`:953.3:
`
`ZO:.<u..EO,m7=
`
`amiazozmza
`
`Hflh.mozO_._.~_O.—
`
`nmamoazum
`
`zo.mm:>_mz$_h
`
`mwémmz
`
`,.<u_Ebm_,_m
`
`MOWPZHZOLEOU
`
`am._:am_=um<D7=Z_<._.m_O
`
`zoawzzm23$
`
`
`
`02.93407:moémmz
`
`Z<..w<m..He.
`
`amE>~_uzmz:
`
`
`
`5:.29:.zozaom
`
`
`
`1_<z:,amemmm_.uv<
`
`
`
`wz.>oa.=amZHE3
`
`
`
`nwmgfizo:.z...:zoo
`
`
`
`mmmo..,..<20:24.4.-
`
`15
`
`amozmz
`
`3.0;
`
`15
`
`
`
`US 8,180,058 B2
`
`1
`ENCRYPTION OF THE SCHEDULED UPLINK
`MESSAGE IN RANDOM ACCESS
`PROCEDURE
`
`CROSS-RliFl_iRl£N(7l'i TO Rlil .A'I“I-ii)
`APP! .lCJ\'I‘I()NS
`
`This application claims the benefit of U.S. Provisional
`Patent application Ser. No. 60i’94S.465 entitled “METHOD
`AND APPARATUS FOR ENCRYPTING UPLINK SCHED-
`ULED MESSAGE IN RANDOM ACCESS PROCEDURE"
`which was filed Jun. 21, 2007 and US. Provisional Patent
`application Ser. No. 601955.867 entitled “A METHOD AND
`APPARATUS FOR t7.N(.‘RYP'l‘lNG U PLINK SCI It'll)-
`UI..lI~ZD MlF.SSAGl5'. IN RANDOM ACCIESS PRO(.‘l-3l)U RE”
`
`which was filed Aug. 14, 2007. The entirety of the aforemen-
`tioned application is herein incorporated by reference.
`
`BACKGROUND
`
`1. Field
`
`The following description relates generally to wireless
`communications.
`and more particularly to controlling
`encryption of uplink messages in a random access procedure
`in a wireless communication system.
`II. Background
`Wireless communication systems are widely deployed to
`provide various types of communication: for instance. voice
`andfor data can be provided via such wireless communication
`systems. A typical wireless communication system, or net-
`work. can provide mttltiple users access to one or more shared
`resources (e.g.. bandwidth. transmit power, . .
`. ). For instance,
`a system can use a variety of multiple access techniques such
`as Frequency Division Multiplexing (FDM), Time Division
`Multiplexing (TDM). Code Division Multiplexing (CDM),
`Orthogonal Frequency Division Multiplexing (OFDM}. and
`others.
`
`Generally. wireless multiple-access conununication sys-
`tems can simultaneously support communication for multiple
`access terminals. Each access terminal can communicate
`with one or more base stations via transmissions on forward
`
`and reverse links. The forward link (or downlink) refers to the
`communication link front base stations to access terminals.
`and the reverse link (or uplink} refers to the communication
`link from access terminals to base stations. This communica-
`
`tion link can be established via a single-in-single-out. mul-
`tiple-in-single-out or a multiple-in-multiple-out (MIMO)
`system.
`M]MO systems commonly employ multiple (NT) transmit
`antennas and multiple (NR) receive antennas for data trans-
`mission. A MIMO channel formed by the Nptransmit and NR
`receive antemias can be decomposed into Ns independent
`channels. which can be referred to as spatial channels. where
`NS§{NrNR}. [Each of the NS independent channels corre-
`sponds to a dimension. Moreover. MIMO systems can pro-
`vide improved performance (e.g._.
`increased spectral effi-
`ciency. higher throughput aitdfor greater reliability) if the
`additional dimensionalities created by the multiple transmit
`and receive antennas are utilized.
`
`MIMO systems can support various duplexing techniques
`to divide forward and reverse link communications over a
`common physical medium. For instance. frequency division
`duplex (FDD) systems can utilize disparate frequency regions
`for forward and reverse link communications. Further, in time
`division duplex fl‘I)l)) systems, forward and reverse link
`communications can employ a common frequency region so
`
`2
`
`that the reciprocity principle allows estimation ofthe forward
`link channel from reverse link channel.
`
`Wireless communication systems oftentimes employ one
`or more base stations that provide a coverage area. A typical
`base station can transmit multiple data streams for broadcast.
`multicast andforunicast services. wherein a data stream may
`be a stream of data that can be of independent reception
`interest to an access terminal. An access terminal within the
`
`1U
`
`coverage area ofsuch base station can be employed to receive
`one. more than one, or all the data streams carried by the
`composite stream. Likewise. an access terminal can transmit
`data to the base station or another access terminal.
`
`An access terminal can utilize a random access procedure
`to gain access to a system (e.g. to obtain allocation of a
`communications channel andlor associated resources, .
`.
`. ).
`For instance. the random access procedure can be used for
`initial access to the system. handover from a source base
`station to a target base station. uplink timing synchronization
`for data transfer. and the like. Typically. an access terminal
`sends a random access preamble on the uplink when the
`access terminal desires to gain access to the system. A base
`station can receive the random access preamble and respond
`with a random access response sent over the downlink. Based
`upon the random access response. the access terminal can
`attempt to send a scheduled transmission over the uplink to
`the base station. However, in the case of contention based
`random access, the base station can be unaware ofan identity
`of the access terminal attempting to transmit the scheduled
`transmission. Hence. conventional techniques oftentimes fail
`to account for the base station being unable to determine an
`identity of a source from which the scheduled transmission
`originates, which can be particularly problematic when such
`scheduled transmission is encrypted.
`
`SUMMARY
`
`The following presents a simplified summary of one or
`more embodiments in order to provide a basic understanding
`ofsucli embodiments. This summary is not an extensive over-
`view of all contemplated embodiments, and is intended to
`neither identify key or critical elements of all embodiments
`nor delineate the scope of any or all embodiments. Its sole
`purpose is to present some concepts of one or n1ore en1bodi—
`ments iii a simplified form as a prelude to the more detailed
`description that is presented later.
`In accordance with one or more embodiments and corre-
`
`sponding disclosure thereof, various aspects are described in
`connection with facilitating employment of a random access
`procedure that leverages encrypted andfor unencrypted data
`in a scheduled uplink message. A random access preamble
`can be sent from an access terminal to a base station. and a
`random access response can be sent from the base station to
`the access terminal . A scheduled transmission message can be
`sent from the access terminal to the base station based upon a
`grant included in the random access response. When conten-
`tion based random access is employed, the scheduled trans-
`mission message or a portion thereof can be unencrypted.
`Further, non-security—critical information can be sent in an
`unencrypted manner in the scheduled transmission message.
`while security-critical information can be encrypted for trans-
`inission (e.g.. included in an encrypted portion of tl1e sched-
`uled transmission message andior transmitted in a subsequent
`encrypted normal scheduled transmission message).
`According to related aspects. a method that facilitates
`employing a random access procedure in a wireless commu-
`nication environment is described herein. The method can
`
`include transmitting a random access preamble to a base
`
`3U
`
`4U
`
`45
`
`50
`
`55
`
`60
`
`65
`
`16
`
`16
`
`
`
`3
`
`4
`
`US 8,180,058 B2
`
`station. Further, the method can comprise receiving a random
`access response front tlte base station based upon the random
`access preamble. Moreover. the method cart include transntit-
`ting a sclteduled transmission message, which includes at
`least a portion that
`is unencryptcd. to the base station as
`granted by the random access response when employing con-
`tention based random access.
`
`Another aspect relates to a wireless contmunications appa-
`ratus. The wireless ootttmunications apparatus can include a
`mentory that retains instructions related to transmitting a
`random access preamble to a base station for at least one of
`initial access. re-entry from non-synchronized state. or han-
`dover from a source base station to tlte base station, receiving
`a random access response from the base station based upon
`the random access preamble. transmitting a scheduled trans-
`mission message. which includes at least a portion that is
`unencrypted. to the base station as granted by the random
`access response when employing contention based random
`access. and receiving a contention resolution message from
`the base station in response to the scheduled transntission
`message. Further. the wireless communications apparatus
`can include a processor. coupled to the memory. configured to
`execute the instructions retained in the memory.
`Yet another aspect relates to a wireless contmunications
`apparatus that enables utilizing a randont access procedure itt
`a wireless cornntunication environment. The wireless com-
`
`ntunications apparatus can include means for sending a ran-
`dom access preamble that includes a common random access
`signature to a base station when employing contention based
`random access. Moreover.
`the wireless communications
`apparatus can include means for obtaining a random access
`response front the base station based upon the random access
`preamble. Further. the wireless communications apparatus
`can include means For sending a scheduled transmission
`including at least an unencrypted portion to the base station as
`granted by tlte random access response when employing con-
`tention based random access.
`Still another aspect relates to a computer program product
`that can comprise a computer-readable medium. The com-
`puter-readable medium Catt include code for transmitting a
`random access preamble to a base station. Further. the com-
`puter~readable medium can include code for receiving a ran-
`dom access response from the base station based upon the
`random access preamble. Moreover. the computer-readable
`medium cart comprise code for transmitting a scheduled
`transmission including at least art tutencrypted portion to the
`base station as granted by the random access response when
`employing contention based random access.
`In accordance with another aspect. an apparatus in a wire-
`less communication system can include a processor, wherein
`the processor can be configured to transmit a random access
`preamble to a base station. The processor can also be config-
`ured to receive a random access response front the base sta-
`tion based upon the random access preamble. Further. the
`processor can be configured to transmit a scheduled transmis-
`sion including at least an unencrypted portion to the base
`station as granted by the random access response when
`employing contention based random access.
`According to other aspects. a method that facilitates deci-
`phering data obtained during a random access procedure in a
`wireless cotruttunication environment is described herein.
`
`The method can include receiving a random access preamble
`from an access tenninal. Further. the method can include
`transmitting a random access response to the access terminal
`based upon the random access preamble. The method cart also
`comprise receiving a sclteduled transmission message. which
`includes at least a portion that is unencryptcd, from the access
`
`5
`
`1D
`
`1)
`
`EU
`
`25
`
`3U
`
`35
`
`4f]
`
`45
`
`50
`
`55
`
`60
`
`65
`
`terminal when employing contention based random access.
`Moreover. the method cart include recognizing an identity of
`the access terminal based upon information included irt the
`portion of the scheduled transmission message that is unen-
`cryptcd when employing contention based random access.
`Yet another aspect relates to a wireless communications
`apparatus that can include a ntemory that retains instructions
`related to receiving a random access preamble front an access
`terminal. transmitting a random access response to the access
`tenninal based upon the random access preamble. receiving a
`scheduled transmission message, which includes at least a
`portion that is unencrypted. from the access terminal when
`employing contention based random access, recognizing an
`identity of the access terminal based upon infomtation
`included in the portion of the scheduled transmission mes-
`sage that is unencrypted when employing contention based
`random access. and determining a security context associated
`with the access terminal based upon the recognized identity
`ofthe access terminal. Further. the wireless comnntnications
`apparatus cart comprise a processor, coupled to the memory.
`configured to execute the instructions retained in the memory.
`Another aspect relates to a wireless comnttutications appa-
`ratus that enables employing a random access procedure in a
`wireless contmunicatiort environment. The wireless comntu-
`
`nications apparatus can include means for obtaining a sched-
`uled transntission message including at least an unencrypted
`portion from the access terminal when employing contention
`based random access. The wireless communications appara-
`tus can further include means for recognizing an identity of
`the access terminal based upon irtfonnation included iii the
`unencrypted portion of the scheduled transmission message.
`The wireless comntuttications apparatus can also include
`means for retrieving a security context associated with the
`access terminal based upon the recognized identity of the
`access terminal. Moreover.
`the wireless communications
`apparatus cart include means for deciphering art encrypted,
`normal scheduled transmission message or encrypted portion
`of the scheduled transmission message that
`includes the
`unencrypted portion received front the access terminal based
`upon the retrieved security context.
`Still another aspect relates to a computer program product
`that can comprise a computer-readable medium. The com-
`puter—readable medium can include code for obtaining a
`scheduled transmission message including at least art unen-
`crypted portion front the access terminal when employing
`contention based random access. The computer-readable
`medium can also include code lor recognizing an identity of
`the access terminal based upon information included in the
`uttencrypted portion of the scheduled transmission message.
`The computer—readable medium can further include code for
`retrieving a security context associated with the access tenni-
`rtal based upon the recognized identity of the access terminal.
`Moreover. the contputer-readable medium cart include code
`for deciphering an encrypted. normal scheduled transmission
`message or encrypted portion of the scheduled transmission
`message that includes the unencrypted portion received front
`the access terminal based upon the retrieved security context.
`In accordance with another aspect. an apparatus in a wire-
`less communication system can include a processor, wherein
`the processor can he configured to receive a schedttled traits-
`mission message including at least an unencrypted portion
`from the access tertttinal when employing contention based
`random access; recognize an identity of the access terminal
`based upon information included in the unencrypted portion
`of the scheduled transmission message; retrieve a security
`context associated with the access terminal based upon the
`recognized identity of the access tenninal; and decipher an
`
`17
`
`17
`
`
`
`5
`
`6
`
`US 8,180,058 B2
`
`scheduled transmission message or
`encrypted, normal
`encrypted por1ion of the scheduled transmission message that
`includes the unencrypted portion received from the access
`terminal based upon the retrieved security context.
`To the accomplishment of the foregoing and related ends.
`the one or 111ore embodiments comprise the features herein-
`after fully described and particularly pointed out
`in the
`claims. The following description and the annexed drawings
`set forth in detail certain illustrative aspects ofthe one or t11ore
`embodiments. These aspects are indicative, however. of but a
`few of the various ways in which the principles of various
`embodiments can be employed and the described embodi-
`ments are intended to include all such aspects and their
`equivalents.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is an illustration of a wireless communication sys-
`tem in accordance with various aspects set forth herein.
`FIG. 2 is an illustration of an example system that controls
`encryption ofuplink messages in a random access procedure.
`FIG. 3 is an illustration ofau example signaling diagram of
`a basic random access procedure i11 accordance with various
`aspects of the subject disclosure.
`FIG. 4 is an illustration ofan example signaling diagram of
`uplink Radio Resource Control (RRC) message transmission
`by a 11011-Syl1Cl]l'0[1l’/’.Cl:l access terminal in accordance with
`various aspects of the subject disclosure.
`FIG. 5 is an illustration of an example signaling diagram
`showing a handover scenario in accordance with various
`aspects of the subject disclosure.
`FIG. 6 is an illustration of an example system that sends
`encrypted andfor unencrypted messages as part ofa random
`access procedure.
`FIG. 7 is an illustration ofan example signaling diagram of
`a random access procedure that communicates encrypted and
`unencrypted information in message 3 in accordance with
`various aspects of the subject disclosure.
`FIG. 8 is an illustration of an example methodology that
`facilitates employing a random access procedure in a wireless
`conuuunication environment.
`
`1"‘IG. 9 is an illustration of an example methodology that
`facilitates deciphering data obtained during a random access
`procedure in a wireless comniunication environment.
`FIG. I E] is an illustration of an example access terminal that
`transmits encrypted andior unencryptcd scheduled uplink
`messages in a wireless coninitutication system.
`FIG. 11 is an illustration ofau example system that evalu-
`ates uncncrypted andi"tJr encrypted scheduled messages
`received over an uplink during a random access procedure in
`a wireless corrununication environment.
`FIG. 12 is an illustration of an example wireless network
`environment that can be employed in conjunction with the
`various systems and methods described herein.
`FIG. 13 is an illustration ofan example system that enables
`utilizing a random access procedure in a wireless connnuni-
`cation environment.
`
`FIG. 14 is an illustration ofa11 example system that enables
`employing a random access procedure in a wireless commu-
`nication environment.
`
`IJIEZTAILFID DESCRIPTION
`
`Various embodinients are now described with reference to
`
`the drawings, wherein like reference numerals are used to
`refer to like elements throughout. In the following descrip-
`tion, for purposes of explanation. numerous specific details
`
`1U
`
`3t]
`
`4t]
`
`45
`
`50
`
`55
`
`60
`
`65
`
`are set forth i11 order to provide a thorough understanding of
`one or more embodiments. It may be evident. however, that
`such ernbodirnent(s) may be practiced without these specific
`details. In other instances. well-known structures and devices
`are shown in block diagram form in order to facilitate describ-
`ing one or more embodiments.
`As used in this application. the temis “component.“ “mod-
`ule.“ “system._" and the like are intended to refer to a com-
`puter-related entity. either liardware, firmware. a combination
`ofliardware and software. software. or software in execution.
`For example_. a component can be. but is not limited to being,
`a process rutuiing on a processor. a processor. an object. an
`executable, a thread of execution. a program, andfor a com-
`puter. By way ofillustration. both an application running on
`a computing device and the computing device can be a com-
`ponent. One or more components can reside within a process
`andfor thread of execution and a component can be local ized
`on one computer andfor distributed between two or more
`computers. In addition. these components can execute from
`various computer readable media having various data struc-
`tures stored thereon. The components can conununicate by
`way of local andfor remote processes such as in accordance
`with a signal having one or more data packets (c.g._. data from
`one component interacting with another component in a local
`system. distributed system. andfor across a network such as
`the Internet with other systems by way of the signal).
`The techniques described herein can he used for various
`wireless cornnttunication systems such as code division mul-
`tiple access
`(CDMA),
`time division multiple access
`(’l‘fJMA).
`frequency division multiple access (I-‘IJM./-\),
`orthogonal frequency division multiple access (OFDM_A]_.
`single carrier-frequency division multiple access
`(SC-
`FDMA) and other systems. The terms “system" and “net-
`work” are often used interchangeably. A CDMA system can
`irnplenient a radio technology such as Universal Terrestrial
`Radio Access {UTRA]_. C DMA2000. etc. UTRA includes
`Wideband-CDMA (W-C‘DMA} and other variants ofCDMA.
`CDMAZUOO covers IS-2000. IS-95 and IS-856 standards. A
`TDMA system can implement a radio teclmology such as
`Global System for Mobile Communications (GSM). An
`OFDMA system can implement a radio technology such as
`Evolved UTRA (E—UTRA)_. Ultra Mobile Broadband
`(UMB), IEEE802.l 1 (Wi—Fi). IEEE 802.16 (WEMAX), IEEE
`802.20. Flash—OFDM. etc. UTRA and E-UTRA are part of
`Universal Mobile Telecommunication System {UMTS].
`3GPP Long Term [Evolution [l..TE} is an upcoming release of
`UMTS that uses E-UTRA. which employs OFDMA on the
`downlink and SC -FDMA on the uplink.
`Single carrier frequency division multiple access (SC-
`FDMA} utilizes single carrier modulation and frequency
`domain equalization. SCFDMA has similar performance
`and essentially the same overall complexity as those of an
`OFDMA system. A SC-FDMA signal has lower peal<-to-
`average power ratio [PAPR) because of its inherent single
`carrier structure. SC-FDMA can be used. for instance.
`in
`uplink communications where Iower PAPR greatly benefits
`access terminals in terms of transmit power efficiency.
`Accordingly. SC —FDMA can be implemented as an upliuk
`multiple access scheme in 9-GPP Long Term [Evolution (I.’I‘l£]
`or Evolved UTRA.
`Furthermore. various embodiments are described herein in
`connection with an access terminal. An access terminal can
`also be called a system. subscriber unit. subscriber station,
`mobile station, mobile. remote station, remote terminal.
`mobile device. user terminal, terminal. wireless communica-
`tion device. uscr agent. user device. or user equipment {Ul.i).
`An access terminal can be a cellular telephone. a cordless
`
`18
`
`18
`
`
`
`7
`
`8
`
`US 8,180,058 B2
`
`telephone. a Session Initiation Protocol (SIP) pho11e. a wire-
`less local loop (WLL) station, a personal digital assistant
`(PDA), a handheld device having wireless connection capa-
`bility. computing device, or other processing device con-
`nected to a wireless modem. Moreover. various embodiments
`are described herein in connection with a base station. A base
`station can be utilized for communicating with access tenni-
`nal(s_‘J and can also be referred to as an access point. Node B.
`Evolved Node 13 (eNodeB) or some other tenninology.
`Moreover. various aspects or features described herein can
`be implemented as a 1nethod_. apparatus, or article of mariti-
`facture using standard programming andfor engineering tech-
`niques. The term “article of manufacture" as used herein is
`intended to encompass a computer program accessible from
`arty computer-readable device. carrier. or media. For
`example. computer-readable media can include but are not
`limited to magnetic storage devices {eg. hard disk. floppy
`disk, magnetic strips, etc.)_. optical disks (e.g._. compact disk
`(CD). digital versatile disk (DVD). etc.). smart cards. and
`flash memory devices (eg. I.El’ROM. card. stick, key drive.
`etc.). Additionally, various storage media described herein
`can represent one or more devices andfor other machine-
`readable media for storing infonnation. “the term “machine-
`readable medium” can include, without being limited to.
`wireless channels and various other media capable of storing.
`containing. andfor canying instruction(s] andfor data.
`Referring now to FIG. 1. a wireless communication system
`100 is illustrated in accordance with various emboditnents
`
`presented herein. System 100 comprises a base station 102
`that can include multiple antenna groups. For example. one
`antenna group can include antennas 104 and 106. another
`g