throbber
X//
`
`=
`
`WIPO
`WORLD
`INTELLECTUAL PROPERTY
`ORGANIZATION
`
`DOCUMENT MADE AVAILABLE UNDER THE
`PATENT COOPERATION TREATY (PCT)
`International application number:
`PCT/JP2020/010735
`
`International filing date:
`
`12 March 2020 (12.03.2020)
`
`Documenttype:
`
`Documentdetails:
`
`Certified copy of priority document
`
`Country/Office:
`Number:
`Filing date:
`
`IN
`201941014041
`08 April 2019 (08.04.2019)
`
`Date of receipt at the International Bureau:
`
`26 March 2020 (26.03.2020)
`
`Remark: Priority document submitted or transmitted to the International Bureau in compliance with Rule
`17.1(a),(b) or (b-bis)
`
`34, chemin des Colombettes
`1211 Geneva 20, Switzerland
`www.wipo.int
`
`APPLE 1005
`
`APPLE 1005
`
`1
`
`

`

`;
`px
`Digital Access Service
`(D
`AS)
`
`WIPO
`WORLD
`INTELLECTUAL PROPERTY
`ORGANIZATION
`
`CERTIFICATE OF AVAILABILITY OF A CERTIFIED PATENT DOCUMENTINA
`DIGITAL LIBRARY
`
`The International Bureau certifies that a copy of the patent application indicated
`below has been available to the WIPO Digital Access Service since the date of
`availability indicated, and that the patent application has been available to the
`indicated Office(s) as of the date specified following the relevant Office code:
`
`Documentdetails: Country/Office:
`
`IN
`
`Filing date: 08 Apr 2019 (08.04.2019)
`
`Application number: 201941014041
`
`Dateof availability of document:
`
`20 Jan 2020 (20.01.2020)
`
`The following Offices can retrieve this document by using the access code:
`AR, AU, BR, CA, CL, CN, DK, EA, EE, EP, ES, Fl, GB, GE, IB, IL, IN,
`JP, KR, MA, NL, NO, NZ, SE, US
`
`Dateof issue ofthis certificate:
`
`26 Mar 2020 (26.03.2020)
`
`34, chemin des Colombettes
`1211 Geneva 20, Switzerland
`
`
`
`2
`
`

`

`On
`aa
`
`INTELLECTUAL
`PROPERTY INDIA
`Yee Sarset| cay -
`freqatiiae svete
`
`GOVERNMENTOF INDIA
`arses wd seal Aare
`MINISTRY OF COMMERCE& INDUSTRY
`ae waters
`
`THE PATENT OFFICE
`
`#
`fare_ Pref
`-
`TO WHOMSOEVERIT MAY CONCERN
`
`(aHeRT &ecTEY Authorised Signata
`
`A wenecarerdt st We xfOferrn, 1970 FF ant 7H3) & aga vera
`CRE, HART Ca cara fag FY HR H garergy ween a ANY rat # fae
`wea HER? & VaaEaRT Ae TAP FRM) & far firafraa Ve & ude
`a age H Beet Searasi(a) AY wer wiatehy sak are werrar BY
`i, the undersigned, being an officer duly authorized to sign and issue the certificate on behalf
`of the Controller Genera! of Patents, Designs and Trademarks in accordance with the
`provisions of Section 73(3) of the Patents Act, 1970, hereby certify that annexed hereto is o
`True Copy of the document(s) asfiled in connection with the following Patent Application:
`
`#) Haat AEAVa) Application Number: 201941014041
`‘@) Wise Frot FP AERA b) Dote of Filing: 08/04/2019
`T) HaRMCT ares) BT ATT:
`C) Nameof the document(s) requested: Priority documents /Pravisional Specification
`
`me WATOTTT Vee HfeerrH, 1970 FY aT 147(1) &Heher Agr ferlecr eifecrat &
`ded srt fear wear #/ This certificate is issued under the powers vested in me U/S 147(1)
`of The Patents Act, 1970.
`
`RaTe/Dated this 20" day ofJanuary 2020
`
`faaze Yee 7 Parsa/ controlerPome’
`
`signs
`
`3
`
`

`

`
`
`
`FORM 1
`THE PATENTS ACT1970 (39 of 1970) and
`The Patents Rules, 2003
`APPLICATION FOR GRANT OF PATENT
`(See section 7, 54 & 135 and sub-rule (1) of rule 20)
`Application No.:
`
`Filing Date :
`Amount of Fee Paid :
`CBR No. :
`Signature :
`1, APPLICANT'S REFERENCE/ IDENTIFICATION NO.(AS
`
`ALLOTTEDBY OFFICE)
`2. TYPE OF APPLICATION [Please tick() at the appropriate category]
`Ordinary(v)
`
`(FOR OFFICE USE
`ONLY)
`
`Addition ()
`
`Addition ()
`
`Addition ()
`3A. APPLICANT(S)
`
`
`
`
`Country of
` Residence
`
`Namiein Full
`
`Nationality
`
`Address of the Applicant
`
`
`
`
` Other than Natural Person
`
`
`
`Small Entity( )|Startup () | Others (/)
`
`
`
`
`4, INVENTOR(S) [Please tick() at the appropriate category]
`
`
`Are all the inventor(s) same as the applicant(s) name above?
`
`No (“ )
`
`If "'No", furnish the details of the inventor(s)
`
`Country of Residence
`
` 2
`
`
`
`
`
`Namein Full
`
`,
`TIWARI, Kundan
`
`TAMURA,
`Toshiyuki
`
`an Indian
`citizen
`
`Address ofthe Inventor
`NECTechnologies India Pvt Ltd, SP
`Infocity, Block-A, 9th Floor Module-2A,
`40, MGRSalai, kandanchavadi,
`Perungudi, Chennai, 600096, India
`NECCorporation, 7-1, Shiba 5-chome,
`Minato-ku, Tokyo 108-8001, Japan
`P
`citizen
`NECCorporation, 7-1, Shiba 5-chome,
`Tapati
`a Dutch
`de Kievit, Sander
`Minato-ku, Tokyo 108-8001, Japan
`citizen
`
`
`5. TITLE OF THE INVENTION
`PROCEDURE TO PROVIDE INTEGRITY PROTECTION TO A UE PARAMETER DURING UE
`CONTIGURATION UPDATE PROCEDURE
`IN/PA-121
`S
`6. AUTHORISED REGISTERED
`
`:
`R R Nair
`Narne
`
`LATENT SCENTS Mobile No.|8939824355
`7. ADDRESS FOR SERVICE OF
`Name
`De Penning & De Penning
`
`4
`
`

`

`sce|120 Velachery Main Road, Guindy,
`Postal Address
`Chennai 600 032
`Telephone No.|9144 - 42213444
`Mobile No
`8939824355
`
`Fax No
`Email ID
`
`9144 - 42213402
`patent@ depenning.com
`A
`DD)
`A
`(yh
`
`ry
`
`)
`
`i
`
`
`
` APPLICANT IN INDIA #3
`
`
`*
`
`
`
`
`
`
`
`
`
`
`
`
`12, DECLARATIONS
`
`(i) Declaration by the inventor(s)
`(In case the applicant is an assignee: the inventor(s) may sign herein below or the applicant may
`upload the assignment or enclose the assignment with this application for patent or send the assigninent by
`post/electronic transmission duly authenticated within the prescribed period).
`We, the above named inventor(s) is/are the true & first inventor(s) for this invention and declare that the
`applicant(s) herein is/are my/our assignee ertegalrepresentative.
`
`Name
`TIWARI, Kundan
`
`Date
`08 April 2019
`
`
`TAMURA,Toshiyuki
`08 April 2019
`
`
`| de Kievit, Sander
`08 April 2019
`
`
`
`5
`
`

`

`
`
`No. of Claims 4andNo.of Pages|||
`
`No. of pages 27
`
`
`
`
`
`(iii) Declaration by the applicant(s)
`We, the applicant(s) hereby declare(s) that:-
`M Lam/Weare in possession of the above mentioned invention.
`@ The provisional / eemptete specification relating to the inventionis filed with this application.
`The Invention as disclosed in the specification uses the biological material from India and the necessary
`permission from the competentauthority shall be submitted by me / us before the grant of patent to me/us
`M There is no lawful groundofobjections tothe grant of the Patent to me/us.
`Ed far / Wearethe true «& first inventor(s).
`M Lam / Weare the assignee erteealrepresentative of true & first inventor(s).
`&) The application or each ofthe applications, particulars of which are given in Para 8 wasthe first
`application in convention country/countries in respect of #¥¥/our invention(s).
`] $/ We claim the priority from the above mentioned application(s) filed in convention country/countries
`andstate that no application for protection in respect ofthe invention had been made in a convention
`country before that date by me/us or by any person from which wederivethetitle.
`My/Our application in India is based on International application under Patent Cooperation Treaty
`(PCT) as mentioned in Paragraph-9.
`&] The application is divided out of my/our application particulars of which is given in Paragraph-10 and
`pray that this application may be treated as deemed to have beenfiled on........undersec. 16 of the Act.
`{] The said invention is an improvement in or modification ofthe invention particulars of which are given
`in Paragraph — 11.
`
`13. FOLLOWING ARE THE ATTACHMENTSWITH THE APPLICATION
`a) Form 2
`
`Item
`Details
`4
`Remarks
`Cormplete/provisional
`Sequence Listing 0
`specification #
`Pages
`No. of Claim(s)
`___No.of Pages 0
`Abstract
`
`No. of Drawing(s)
`No. of Drawings 12 and No. of Pages 12
`# In case of a complete specification, if the applicant desires to adopt the drawings filed with his
`provisional specification as the drawings or part of the drawings for the complete specification under
`rule 13(4), the no. of such pages filed with the provisional specification are required to be mentioned here.
`
`6
`
`

`

`
`
`
`
`taternationalPreliminaryExaminationAuthority HPEA)as-appleable (2 copies)
`
`
`
`
`
`(f)
`(g) Statement and undertaking on Form 3
`(h) Copy of GPA
`
`Total Fee Rs.16000/- is paid by e-filing module.
`
`t/ Wehereby declare that to the best of my/our knowledge, information and beliefthe fact and matters
`stated herein are correct and we request that a patent may be granted to me/us for the said invention.
`
` (b) provisional specification @
`
`Name : R R Nair
`Of De Penning & De Penning
`Agentfor the Applicants
`
`Dated this 08 day of April 2019
`
`Signature :
`
`~Digitally signed~
`
`To,
`The Controller of Patents
`The Patent Office, at Chennai
`
`
`
`7
`
`

`

`FORM2
`
`‘THE PATENTS ACT, 1970
`(39 of 1970)
`THE PATENTS RULES, 2003
`
`PROVISIONAL
`SPECIFICATION
`
`(See section 10; rule 13)
`
`TITLE OF THE INVENTION
`
`“PROCEDURE TO PROVIDE INTEGRITY PROTECTION TO A UE PARAMETER
`DURING UE CONFIGURATION UPDATE PROCEDURE”
`
`APPLICANT
`
`NEC Corporation
`7-1, Shiba 5-chome, Minato-ku, Tokyo 108-8001
`Japan; Nationality: Japan
`
`The following specification
`describes the invention
`
`8
`
`

`

`TESS oF Saignt AHOKoaNon:
`Procedureto provide Integrity protection to a UE parameter during UE configuration update
`procedure.
`
`AHSgyyrac’
`
`This disclosure is related to the procedure to provide integrity protection to a UE parameterduring the
`Steering of Roaming and UE parameter update procedure using Control Plane signaling. More
`specifically the method provides a mechanism to choosea security key to integrity protect a UE
`parameter whenthe UE is registered to more than one PLMN and more than one security key exist in
`the network.
`
`ey
`Y
`3. Sgsearinien of Sroagfeny fo Gs SalveSy Me aiscfesures
`Background
`
`When a UE registers to two different PLMNs which are not equivalent PLMNs via a 3GPP access
`and a non-3GPPaccessthen the UE is registered to two different AMFs belonging to each
`PLMN. In this scenario the UE maintains two independent 5G security contexts (Kame and keys
`lowerin the key hierarchy), one for each serving PLMN. Whena UE is registered to a same
`PLMN or equivalent PLMN via a 3GPP access and anon-3GPPaccessthenthe UE is registered
`to the single AMF and maintains one security context.
`
`When the UDM decidesto update the preferred PLMNlist or RAT to the UE whenthe UE is
`registered to the visited PLMN then the UDMinitiates Steering of Roaming procedureto transfer
`the steering information (preferred list of PLMN or RAT) for PLMNselection. The steering of
`roaming information is integrity protected using the security key Kausr at an AUSF. When the UE
`receives steering information, the UE uses Kausto verify the integrity protection. Similar
`procedure is applied to update the UE parameters using the UDM control plane procedure.
`
`Problem Statement 1:
`
`Whena UE is registered to two different PLMNs which are not equivalent PLMNs via a 3GPP
`access and non-3GPPaccess,then the UE hastwo 5G security contexts (e.g Security Keys)at
`the various network nodes.In this scenario the AUSF has one Kausr, namely the KAUSFresulting
`from the latest authentication. During the registration procedure over one access network if the
`UDMdecidesto send steering information to the UE and sends a message containing steering
`information and requesting AUSFto provide integrity protection to the steering information, the
`AUSFcalculates the MAC-Ifor integrity protection of the message using the Kausr resulting from
`the latest authentication. Then, if the UE receives the message, it is unclear to the UE which Kausr
`the AUSF has usedfor the calculation of the MAC-I for integrity protection of the steering of
`roaming message.
`
`In an another scenarios when the UEsare registered to two different PLMNs which are not
`equivalent and the UDM decides to send steering information to the UE,thenit is not clear at UDM
`among two registered PLMNs which PLMNis chosento send Steering information.
`
`Page | 1
`
`NID form version FY17_v2
`
`PRIVILEGED CONFIDENTIAL
`
`9
`
`9
`
`

`

`Problem Statement 2:
`
`When a UE is registered to two different PLMNs which are not equivalent PLMNs via a 3GPP
`access and non-3GPPaccess, then the UE has two 5G security contexts (e.g Security Keys) at
`the various network nodes. In this scenario when a UDM decides to perform UE parameter update
`procedure to update the UE configuration (e.g. Routing Identity) using control plane signaling then
`itis not clear among two registered PLMNs which PLMN the UDMwill choose to send an updated
`UE configuration.
`
`a Osserfovien of Oisclasure aisy Sowodivenls
`Abbreviations
`
`For the purposesof the present document, the abbreviations given in 3GPP TR 21.905 [1] and the
`following apply. An abbreviation defined in the present document takes precedence overthe definition
`of the same abbreviation, if any, in 3GPP TR 21.905[1].
`
`5GC
`
`5GS
`
`5G-AN
`
`5G-GUTI
`
`5G S-TMS]
`
`5Ql
`
`AF
`
`AMF
`
`AN
`
`AS
`
`AUSF
`
`CM
`
`CP
`
`CSFB
`
`DL
`
`DN
`
`DNAI
`
`DNN
`
`EDT
`
`EPS
`
`5G Core Network
`
`5G System
`
`5G Access Network
`
`5G Globally Unique Temporary Identifier
`
`5G S-Temporary Mobile Subscription Identifier
`
`5G QoS Identifier
`
`Application Function
`
`Access and Mobility Management Function
`
`Access Node
`
`Access Stratum
`
`Authentication Server Function
`
`Connection Management
`
`Control Plane
`
`Circuit Switched (CS) Fallback
`
`Downlink
`
`Data Network
`
`DN Access Identifier
`
`Data Network Name
`
`Early Data Transmission
`
`Evolved Packet System
`
`Page | 2
`
`NID form version FY17_v2
`
`PRIVILEGED CONFIDENTIAL
`
`10
`
`10
`
`

`

`EPC
`
`FOQDN
`
`GFBR
`
`GMLC
`
`GPSI
`
`GUAMI
`
`HR
`
`I-RNTI
`
`LADN
`
`LBO
`
`LMF
`
`LRF
`
`MAC
`
`MFBR
`
`MICO
`
`MME
`
`N3IWF
`
`NAI
`
`NAS
`
`NEF
`
`NF
`
`Evolved Packet Core
`
`Fully Qualified Domain Name
`
`Guaranteed Flow Bit Rate
`
`Gateway Mobile Location Centre
`
`Generic Public Subscription Identifier
`
`Globally Unique AMFIdentifier
`
`Home Routed (roaming)
`
`|-Radio Network Temporary Identifier
`
`Local Area Data Network
`
`Local Break Out (roaming)
`
`Location ManagementFunction
`
`Location Retrieval Function
`
`Medium Access Control
`
`Maximum FlowBit Rate
`
`Mobile Initiated Connection Only
`
`Mobility Management Entity
`
`Non-3GPP Inter Working Function
`
`Network Access Identifier
`
`Non-Access Stratum
`
`Network Exposure Function
`
`Network Function
`
`NG-RAN
`
`Next Generation Radio Access Network
`
`NR
`
`NRF
`
`NSI ID
`
`NSSAI
`
`NSSF
`
`NSSP
`
`PCF
`
`PEl
`
`New Radio
`
`Network Repository Function
`
`Network Slice Instance Identifier
`
`Network Slice Selection Assistance Information
`
`Network Slice Selection Function
`
`Network Slice Selection Policy
`
`Policy Control Function
`
`Permanent EquipmentIdentifier
`
`Page | 3
`
`NID form version FY17_v2
`
`PRIVILEGED CONFIDENTIAL
`
`11
`
`11
`
`

`

`PER
`
`PFD
`
`PLMN
`
`PPD
`
`PPI
`
`PSA
`
`OFI
`
`QoE
`
`(R)AN
`
`RLC
`
`RM
`
`ROQA
`
`RQI
`
`RRC
`
`SA NR
`
`SBA
`
`SBI
`
`SD
`
`SDAP
`
`SEAF
`
`SEPP
`
`SMF
`
`PacketError Rate
`
`Packet Flow Description
`
`Public land mobile network
`
`Paging Policy Differentiation
`
`Paging Policy Indicator
`
`PDU Session Anchor
`
`QoS Flow Identifier
`
`Quality of Experience
`
`(Radio) Access Network
`
`Radio Link Control
`
`Registration Management
`
`Reflective QoS Attribute
`
`Reflective QoS Indication
`
`Radio Resource Control
`
`Standalone New Radio
`
`Service Based Architecture
`
`Service Based Interface
`
`Slice Differentiator
`
`Service Data Adaptation Protocol
`
`Security Anchor Functionality
`
`Security Edge Protection Proxy
`
`Session Management Function
`
`S-NSSAI
`
`Single Network Slice Selection Assistance Information
`
`SSC
`
`SST
`
`SUCI
`
`SUPI
`
`SoR
`
`UDSF
`
`UICC
`
`Session and Service Continuity
`
`Slice/Service Type
`
`Subscription Concealed Identifier
`
`Subscription PermanentIdentifier
`
`Steering of Roaming
`
`Unstructured Data Storage Function
`
`UniversalIntegrated Circuit Card
`
`Page | 4
`
`NID form version FY17_v2
`
`PRIVILEGED CONFIDENTIAL
`
`12
`
`12
`
`

`

`UL
`
`UL CL
`
`USIM
`
`UPF
`
`UDR
`
`URSP
`
`SMS
`
`SMSF
`
`MT
`
`UAC
`
`ODACD
`
`OS
`
`Definitions
`
`Uplink
`
`Uplink Classifier
`
`Universal Subscriber Identity Module
`
`User Plane Function
`
`Unified Data Repository
`
`UE Route Selection Policy
`
`Short Message Service
`
`SMS Function
`
`Mobile Terminated
`
`Unified Access Control
`
`Operator Defined Access Category Definitions
`
`Operating System
`
`For the purposesof the present document, the terms and definitions given in 3GPP TR 21.905[1]
`and the following apply. A term defined in the present document takes precedence over the
`definition of the same term, if any, in 3GPP TR 21.905[1].
`
`List of References
`
`[1] 3GPP TR 21.905: "Vocabulary for 3GPP Specifications". V15.0.0 (2018-03).
`[2] 3GPP TS 23.501: "System Architecture for the 5G System; Stage 2". V15.4.0 (2019-01).
`[3] 3GPP TS 23.502: "Procedures for the 5G System; Stage 2" V15.4.0 (2019-01).
`[4] 3GPP TS 24.501: “Non-Access-Stratum (NAS) protocol Stage 3” V15.2.1 (2019-01).
`[5] 3GPP TS 33.501: "Security architecture and procedures for 5G system" V15.3.1 (2018-12).
`
`Page |5
`
`NID form version FY17_v2
`
`PRIVILEGED CONFIDENTIAL
`
`13
`
`13
`
`

`

`Embodimenis
`
`Exemplary embodiments now will be described with reference to the accompanying drawings. The
`disclosure may, however, be embodied in manydifferent forms and should not be construed as
`limited to the embodiments set forth herein; rather, these embodiments are provided so that this
`disclosure will be thorough and complete, andwill fully convey its scope to thoseskilled in the art. The
`terminology usedin the detailed description of the particular exemplary embodimentsillustrated in the
`accompanying drawingsis not intendedto belimiting. In the drawings, like numbersreferto like
`elements.
`It is to be noted, however,that the reference numerals in claimsillustrate only typical embodiments of
`the present subject matter, and are therefore, not to be consideredfor limiting of its scope, for the
`subject matter may admit to other equally effective embodiments.
`
`The specification may refer to “an”, “one” or “some” embodiment(s) in several locations. This does not
`necessarily imply that each such referenceis to the same embodiment(s), or that the feature only
`applies to a single embodiment. Single features of different embodiments may also be combined to
`provide other embodiments.
`
`As usedherein, the singular forms “a”, “an” and “the” are intendedto include the plural forms aswell,
`unless expressly stated otherwise. It will be further understood that the terms “includes”, “comprises”,
`“including” and/or “comprising” when usedin this specification, specify the presence of stated
`features, integers, steps, operations, elements, and/or components, but do not preclude the presence
`or addition of one or more other features, integers, steps, operations, elements, components, and/or
`groupsthereof. It will be understood that when an elementis referred to as being “connected”or
`“coupled” to another element, it can be directly connected or coupled to the other element or
`intervening elements may be present. Furthermore, “connected”or “coupled” as used herein may
`include operatively connected or coupled. As used herein, the term “and/or” includes any andall
`combinations and arrangements of one or more of the associatedlisted items.
`
`Unless otherwise defined, all terms (including technical and scientific terms) used herein have the
`same meaning as commonly understood by one ofordinaryskill in the art to which this disclosure
`pertains.It will be further understood that terms, such as those defined in commonly used dictionaries,
`should be interpreted as having a meaningthat is consistent with their meaning in the context of the
`relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so
`defined herein.
`
`The figures depict a simplified structure only showing some elements and functional entities, all being
`logical units whose implementation may differ from what is shown. The connections shownare logical
`connections; the actual physical connections may be different. It is apparent to a person skilled in the
`art that the structure may also comprise other functions and structures.
`
`Also, all logical units described and depictedin the figures include the software and/or hardware
`components requiredfor the unit to function. Further, each unit may comprise within itself one or more
`components which are implicitly understood. These components may be operatively coupled to each
`other and be configured to communicate with each other to perform the function of the said unit.
`
`Page | 6
`
`NID form version FY17_v2
`
`PRIVILEGED CONFIDENTIAL
`
`14
`
`14
`
`

`

`First embodiment(Solution 1 to solve problem statement 1):
`
`Indicating PLMN identity or RAT to select a security key to provide integrity protection to SoR
`in SoR transmission procedure during the registration procedure.
`
`The detailed steps to transfer the SoR to a UE whentheUEis registered to two different PLMNsvia
`two different RAT or to a same PLMN via two different 5G-AN.
`
`0. A UE is registered to a first visited PLMN overa first 5G Access Network (5G-AN). During the
`authentication procedure the AUSFstoresthefirst Kausr of the UE andstoresthe first PLMN identity
`andthefirst 5G-AN togetherwith this Kausr. As such, the AUSF keeps not only the Kausr and the UE
`Identifier, such as SUPI, but also the PLMN ID and the related RAT. Upon completion of the
`authentication procedure, the UE also stores the Kausr the PLMN ID and the RAT associated with
`this Kausr in a storage in the UE.
`
`1. The UE initiates a second registration procedure over a second 5G-AN to a second visited PLMN
`by sending Registration Request message. This registration procedure mayinitial registration
`procedure, registration update procedure or periodic registration update procedure.
`
`2. The AMF decidesto initiate authentication procedure. The AMF/SEAF executes authentication
`procedure as described in the embodiment. According to the prior art, the AUSF would overwrite the
`Kausr in storage during the authentication procedure. In this embodiment, the AUSFwill store a
`second Kausr in addition to the first one together with the PLMN ID of the access network and the
`RAT of the access network that was used during the authentication. When the authentication
`completes, the UE also stores a second Kausr and associates the PLMNID of the second access
`network with it, just like the AUSF does. The UE now hasa storageincluding two tuples of Kausr and
`PLMN IDs. This storage can be extended for each further run of authentications to new networks, for
`exampleif the UE attaches to a third access network and a new authentication run is completed.
`
`3. The network executes the Security Mode Control procedure.
`
`3-a. The AMF sends the Nudm_UECM_Registration to the UDM to inform the Radio Access
`Technology (RAT) being used.
`
`4. The AMF sends a message Nudm_SDM_Getto the UDM to get the subscriber data.
`
`5. The UDM decides to send Steering information to the UE via the second PLMN. The UDM sends a
`message Nausf_SoRProtection containing information elementat least one of the parameter SUPI,
`SOR Header, the second PLMNidentity or the selected Radio Access Technology (RAT). The UDM
`may send the second PLMN identity or the RAT of the second PLMN identity or both.
`
`6. When the AUSFreceives the Nausf_SoRProtection message then the AUSFretrieves the Kausr
`related to the UE Identity and the indicated PLMNIdentity or the indicated RATin the
`Nausf_SoRProtection message from storage and selectsit to be used for integrity protection. The
`AUSF usesthe selected Kausr to calculate SoR-MAC-lausf and optionally SoR-MAC-lue according to
`the mechanism specified in TS 33.501, namely:
`SoR-MAC-lausr = KDF (SoR Header, PLMN ID Access Technologylist, Kausr).
`The KDFis a key derivation function, which is a cryptographic one wayfunction such as a HMAC-
`SHA256. Other cryptographic hash functions could also be used. Thefields indicated between the
`brackets indicate the clear text parts and thelast field indicates that a KAUSFis usedasinput keyto
`the KDF.In the case that the SoR mechanism is usedfor different purposes than sending the PLMN
`ID AccessList, the plain text input fields will change, but the input key will remain the same. Also, as
`one skilled in the art will appreciate, it is also possible to use a different input key, for example, a key
`derived from Kausr specifically for the purpose or another key resulting from an earlier authentication
`run.
`
`7. The AUSF sends the Nausf_SoRProtection_Response message containing SoR-MAC-lausf ,
`Counter SoR and optionally SoR-XMAC-lue to the UDM.
`
`Page | 7
`
`NID form version FY17_v2
`
`PRIVILEGED CONFIDENTIAL
`
`15
`
`15
`
`

`

`8. The UDM sends Nudm_SDM_Get_Responsecontaining List, SoR-MAC-| and SoR-Counterto the
`AMF.
`
`9. The AMF sendsRegistration Accept messagecontaining at least one of the parameterList, SoR
`hearder, SoR-MAC-I| and SoR-Counter to the UE.
`
`10. Upon reception of the message,the UE first verifies which 5G-AN or a PLMN wasused to send
`the message. Then, the UE retrieves the Kausr associated with the 5G-AN or the PLMNidentity from
`storage and selects this key to be usedfor verifying the integrity protection applied by the AUSF. The
`UE subsequently verifies the integrity protection by verifying the SoR-MAC-lausr applied to the
`messageandif correct, the UE may return a registration acknowledgement message to the UDM. If
`the UE returns a registration acknowledgement message to the UDM, it will integrity protect the
`messageby calculating the SoR-MAC-luc using the same Kausr as was selectedforthe verification of
`the SoR-MAC-lausr.
`
`The Nausf_SoRProtection and Nausf_SoRProtection_Response messageare further defined in the
`fifth embodiment.
`
`Variant of first embodiment.
`
`The detailed steps of transfer of SoR whenthe UE is registered to a PLMNvia different 5G-AN or toa
`different PLMN via different 5G-AN:
`
`1. A UE is registered to a first PLMN overfirst 5G-AN and to a second PLMN over a second 5G-AN.
`According to the first embodiment, both the UE and the AUSF havekepta storage with at least two
`Kausrs associated with the access network. As such, the AUSF has two Kausesfor this particular UE,
`one for the first PLMN and another for the second PLMN. The UE similarly has two Kausrs, one
`associated with the first PLMN and one associated with the second PLMN.
`
`2. A UDM decidesto notify of the changes of Steering information(list of preferred PLMN/access
`technology combinations). The UDM selects a PLMN from thefirst PLMN and the second PLMN
`when the first PLMN and second PLMN aredifferent and are not equivalent PLMNs or a RATfrom the
`first 5G-AN and the second 5G-AN when the UE the first PLMN and the second PLMN areidentical
`PLMN or equivalent PLMN based on for example the following factors:
`
`i) The UE is in connected state over a PLMN, (e.g. the UDM delivers the SoR via a PLMN wherethe
`UE is in connectedstate).
`
`ii) 5G-AN type (e.g. 3GPP accessis preferred over non-3GPP access).
`
`iii) Congestion in the PLMN (e.g. sends through the PLMN whichis least congestedoris not
`congested).
`
`iv) The PLMNthat the UE latest authenticated to (some UEs may not support the feature of storing
`multiple Kausrs, which meansthat the UDM should decideto usethelatest)
`
`3. Steps 5, 6 and 7 of thefirst embodiment are executed.
`
`4. The UDMinitiates Nudm_SDM_UpdateNotification message to the AMF of the selected PLMN or
`selected RATin step 2.
`
`The UDMincludes a selected RATin the Nudm_SDM_UpdateNotification messageif the UEs are
`registered to the same AMF when the first PLMN and the second PLMN areidentical or equivalent
`PLMNs,
`
`In case of core network sharing when an AMFis shared by multiple PLMN then UDMalsoincludes
`selected PLMN Identity in the Nudm_SDM_UpdateNotification message.
`
`Page | 8
`
`NID form version FY17_v2
`
`PRIVILEGED CONFIDENTIAL
`
`16
`
`16
`
`

`

`5. The AMF delivers the SoR using DL NAS Transport message via the RAT present in the
`Nudm_SDM_UpdateNotification message or via the network corresponding to the PLMNidentity
`present in the Nudm_SDM_UpdateNotification message.
`
`6. The AMF sends the DL NAS Transport message to the UE. Then, Step 10 of the first embodiment
`is executed.
`
`In one example if the UDM acknowledgesthat the UE has two associated AMFs(i.e. two PLMNs) one
`for 3GPP accessand the other one for non-3GPPaccess, the UDM maysend two
`Nudm_UDM_Notification messages containing (SoR information, SoR-Header, SoR-MAC-lausr,
`Countersor to two AMFs.
`
`Page | 9
`
`NID form version FY17_v2
`
`PRIVILEGED CONFIDENTIAL
`
`17
`
`17
`
`

`

`Second Embodiment(Solution 2 to solve problem statement 2)
`
`Selecting a PLMN and corresponding security key to provide integrity protection to UE
`configuration data in UE parameter update procedure using control plane solution.
`
`The detailed UE Parameters Update using control plane procedure are described below:
`
`1. A UE is registered to a first PLMN overa first 5G-AN and to a second PLMN over a second 5G-AN.
`The AUSF has generated and stored two KAUSFsin a key storage, oneforthe first PLMN and
`anotherfor the second PLMN. Similarly, the UE has stored two Kausrs, one associated withthe first
`PLMN and one associated with the second PLMN.
`
`2. A UDM decides to perform the UE parameters Update procedure (UPU) using control plane
`procedure. The UDM selects a PLMNfrom thefirst PLMN and the second PLMN whenthefirst PLMN
`and second PLMN aredifferent and are not equivalent PLMNs or a RATfrom the first 5G-AN and the
`second 5G-AN whenthe UE the first PLMN and the second PLMNareidentical PLMN or equivalent
`PLMN basedonat least oneof the following factors:
`
`i) the UE is in connected state over a PLMN, (e.g. the UE delivers the SoR via a PLMN where the UE
`is in connected state).
`
`ii) 5G-AN type (e.g. 3GPP accessis preferred over non-3GPP access).
`
`iii) Congestion in the PLMN (e.g. sends through the PLMNwhichis least congestedoris not
`congested).
`
`iv) The PLMNthat the UE latest authenticated to (some UEs may not support the feature of storing
`multiple Kausrs, which meansthat the UDM should decideto usethe latest)
`
`3. The UDM sends Nausf_UPUProtection message containing SUPI, UPU data and optionally Ack
`Indication at least one of the selected RAT or the selected PLMN ID to the AUSF.
`
`4. The AUSF selects Kausf corresponding to the RAT or the PLMNsent in the Nausf_UPUProtection
`message according to the description in embodiment 1 or 2. The AUSF usesthe selected Kausf to
`calculate UPU-MAC-lausf, Counterupu or UPU-XMAC-lue. The AUSF sends Nausf_UPUProtection
`Response containging UPU-MAC-lausf or UPU-XMAC-lue or Counterupu.
`
`5. The UDM sends Nudm_SDM_Notification message containing (UPU data, UPU-MAC-lausf,
`Counterupu) to the AMF of the selected PLMN. The UDM alsoincludes the selected RAT as
`described in the step 2 in Nudm_SDM_Notification message. The UDM mayinclude new parameter
`“subscriber data reload required” in Nudm_SDM_Notification message.
`
`In case that the UDM acknowledgesthat the UE has two associated AMFs(i.e. two registered
`PLMNs) one for 3GPP accessand the other one for non-3GPP access, the UDM may send two
`Nudm_UDM_Notification messages to two AMFs.
`
`Alternatively, the UDM indicates the AMF that reloading subscriber data from the UDM is required in
`the Nudm_SDM_Notification message. If the AMF receives the Nudm_SDM_Notification message
`with the parameter“subscriber data reload required”. The AMF sets newflag “subscriber data reload
`required” active and the AMF sends the DL NAStransport messageto the UE with parameter“re-
`registration required” so that the UE can perform tworegistration procedures one for 3GPP access
`and the other one for non-3GPP access. When the AMF receivesthe registration request message
`from the UE and the AMF hasa flag “subscriber data reload required” active, the AMF invokes the
`Nudm_SDM_Getprocedure to the UDMto fetch the latest subscriber data from the UDM eventhe
`AMF has the subscriber data. One the AMF performs the Nudm_SDM_Getprocedure, then the AMF
`sets the flag “subscriber data reload required” inactive.
`
`Page | 10
`
`NID form version FY17_v2
`
`PRIVILEGED CONFIDENTIAL
`
`18
`
`18
`
`

`

`Alternatively, the UDMindicates the AMF that reloading subscriber data from the UDM is required in
`the Nudm_SDM_Notification message.If the AMF receives the Nudm_SDM_Notification message
`with the parameter“subscriber data reload required”. The AMF sends the DL NAStransport message
`to the UE with new parameter“re-registration required for subscriber data reloading” so that the UE
`can perform two registration procedures one for 3GPP accessand the other one for non-3GPP
`access. When the AMFreceivesthe registration request message with the parameter“re-registration
`required for subscriber data reloading” from the UE, the AMF invokes the Nudm_SDM_Getprocedure
`to the UDM tofetch the latest subscriber data from the UDM even the AMF hasthe subscriber data.
`
`In case that the UDM acknowledgesthat the UE has two associated AMFs but new updated UE
`configuration data affects only one AMF, then the UDM maysend only one Nudm_UDM_Notification
`messageto the AMF thatis affected by this update.
`
`6. The AMF delivers the UPU data, UPU-MAC-lausf, Counterupu to the UE in DL NAS Transport
`message via selected PLMN orvia selected RAT.
`
`7. As according to embodiment 1, the UE selects the appropriate key from the storage, i.e. becauseit
`detects which AN was used for sending the SoR messageor becauseit readsafield in the SoR
`messagethat indicates the AN (or other key identifying information). Using the selected key, the UE
`p

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket