Patents by Inventor Cogol Tina
Cogol Tina has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230247493Abstract: In an aspect, the present disclosure includes a method, apparatus, and computer readable medium for wireless communications for configuring of a NAS COUNT value of a mapped EPS security context associated with an intersystem change of a UE from a 5G system to an EPS. The aspect includes generating, by a UE, a mapped EPS security context associated with an intersystem change of the UE from a 5G system to an EPS, wherein the mapped EPS security context comprises security parameters created based a 5G security context used for the 5G system, the security parameters enabling security-related communications between the UE and a network entity; determining an UL NAS COUNT value and the DL NAS COUNT value for the mapped EPS security context; and transmitting, by the UE, a NAS message to the network entity, the NAS message including the UL NAS COUNT value of the mapped EPS security context.Type: ApplicationFiled: April 12, 2023Publication date: August 3, 2023Inventors: Soo Bum LEE, Adrian Edward ESCOTT, Cogol TINA, Anand PALANIGOUNDER
-
Patent number: 11632695Abstract: In an aspect, the present disclosure includes a method, apparatus, and computer readable medium for wireless communications for configuring of a NAS COUNT value of a mapped EPS security context associated with an intersystem change of a UE from a 5G system to an EPS. The aspect includes generating, by a UE, a mapped EPS security context associated with an intersystem change of the UE from a 5G system to an EPS, wherein the mapped EPS security context comprises security parameters created based a 5G security context used for the 5G system, the security parameters enabling security-related communications between the UE and a network entity; determining an UL NAS COUNT value and the DL NAS COUNT value for the mapped EPS security context; and transmitting, by the UE, a NAS message to the network entity, the NAS message including the UL NAS COUNT value of the mapped EPS security context.Type: GrantFiled: June 10, 2020Date of Patent: April 18, 2023Assignee: QUALCOMM IncorporatedInventors: Soo Bum Lee, Adrian Edward Escott, Cogol Tina, Anand Palanigounder
-
Publication number: 20220369176Abstract: Aspects disclosed herein facilitate security handling of 5GS to EPC reselection are disclosed herein. An example method at a UE includes transmitting a first TAU request, the first TAU request encoded using a first security context associated with a first RAT, the first TAU request being integrity protected using a first uplink count based on the first security context, and the first TAU request including a first set of information including an identifier mapped to a second RAT associated with the first network entity. The example method also includes transmitting a second TAU request, the second TAU request including the first set of information, the second TAU request being integrity protected using a second uplink count. The example method also includes communicating based on a mapped security context based on the first security context and at least one of the first uplink count or the second uplink count.Type: ApplicationFiled: May 11, 2022Publication date: November 17, 2022Inventors: Dominique Francois BRESSANELLI, Osama LOTFALLAH, Cogol TINA, Abhishek BHATNAGAR, Vitaly DRAPKIN, Lenaig Genevieve CHAPONNIERE
-
Publication number: 20220078617Abstract: Techniques and apparatus for optimizing an initial access stratum security mode command procedure are described. One example technique includes sending a first service request to establish a connection with a network. A second service request is sent to the network, upon determining that one or more criteria is satisfied. Another example technique includes sending a first service request to establish a connection with a network and sending a second service request after sending the first service request. The first service request is associated with a first security parameter and the second service request is associated with a second security parameter. A security mode command procedure is participated in with a base station, based on the first security parameter and the second security parameter.Type: ApplicationFiled: September 7, 2021Publication date: March 10, 2022Inventors: Xuepan GUAN, Osama LOTFALLAH, Vitaly DRAPKIN, Cogol TINA, Swathi SESHADRI
-
Publication number: 20200396647Abstract: In an aspect, the present disclosure includes a method, apparatus, and computer readable medium for wireless communications for configuring of a NAS COUNT value of a mapped EPS security context associated with an intersystem change of a UE from a 5G system to an EPS. The aspect may include generating, by a UE, a mapped EPS security context associated with an intersystem change of the UE from a 5G system to an EPS, wherein the mapped EPS security context comprises security parameters created based a 5G security context used for the 5G system, the security parameters enabling security-related communications between the UE and a network entity; determining an UL NAS COUNT value and the DL NAS COUNT value for the mapped EPS security context; and transmitting, by the UE, a NAS message to the network entity, the NAS message including the UL NAS COUNT value of the mapped EPS security context.Type: ApplicationFiled: June 10, 2020Publication date: December 17, 2020Inventors: Soo Bum LEE, Adrian Edward Escott, Cogol Tina, Anand Palanigounder
-
Patent number: 10791463Abstract: Methods, systems, and devices for wireless communication are described. A user equipment (UE) may be configured to include procedures to mitigate denial of service (DoS) attack by a rogue base station when the initial non-access stratum (NAS) messages between the UE and a mobility management entity (MME) is unprotected. UE may maintain a temporary forbidden network list, which resides outside a subscriber identity module (SIM), and update a forbidden network list, which resides on the SIM, only under certain conditions. For example, a visited network, from which the UE receives a reject message, may be added to the forbidden network list on the SIM only when a counter associated with the visited network is equal to a maximum counter value, which is configured by the UE.Type: GrantFiled: November 11, 2019Date of Patent: September 29, 2020Assignee: QUALCOMM IncorporatedInventors: Swathi Seshadri, Cogol Tina, Abhishek Bhatnagar, Mona Agrawal
-
Publication number: 20200077268Abstract: Methods, systems, and devices for wireless communication are described. A user equipment (UE) may be configured to include procedures to mitigate denial of service (DoS) attack by a rogue base station when the initial non-access stratum (NAS) messages between the UE and a mobility management entity (MME) is unprotected. UE may maintain a temporary forbidden network list, which resides outside a subscriber identity module (SIM), and update a forbidden network list, which resides on the SIM, only under certain conditions. For example, a visited network, from which the UE receives a reject message, may be added to the forbidden network list on the SIM only when a counter associated with the visited network is equal to a maximum counter value, which is configured by the UE.Type: ApplicationFiled: November 11, 2019Publication date: March 5, 2020Inventors: Swathi SESHADRI, Cogol TINA, Abhishek BHATNAGAR, Mona AGRAWAL
-
Patent number: 10477400Abstract: Methods, systems, and devices for wireless communication are described. A user equipment (UE) may be configured to include procedures to mitigate denial of service (DoS) attack by a rogue base station when the initial non-access stratum (NAS) messages between the UE and a mobility management entity (MME) is unprotected. UE may maintain a temporary forbidden network list, which resides outside a subscriber identity module (SIM), and update a forbidden network list, which resides on the SIM, only under certain conditions. For example, a visited network, from which the UE receives a reject message, may be added to the forbidden network list on the SIM only when a counter associated with the visited network is equal to a maximum counter value, which is configured by the UE.Type: GrantFiled: July 10, 2018Date of Patent: November 12, 2019Assignee: Qualcomm IncorporatedInventors: Swathi Seshadri, Cogol Tina, Abhishek Bhatnagar, Mona Agrawal
-
Publication number: 20190053054Abstract: Methods, systems, and devices for wireless communication are described. A user equipment (UE) may be configured to include procedures to mitigate denial of service (DoS) attack by a rogue base station when the initial non-access stratum (NAS) messages between the UE and a mobility management entity (MME) is unprotected. UE may maintain a temporary forbidden network list, which resides outside a subscriber identity module (SIM), and update a forbidden network list, which resides on the SIM, only under certain conditions. For example, a visited network, from which the UE receives a reject message, may be added to the forbidden network list on the SIM only when a counter associated with the visited network is equal to a maximum counter value, which is configured by the UE.Type: ApplicationFiled: July 10, 2018Publication date: February 14, 2019Inventors: Swathi SESHADRI, Cogol TINA, Abhishek BHATNAGAR, Mona AGRAWAL
-
Publication number: 20160309523Abstract: Systems, methods, and apparatuses for reducing delays associated with an attachment procedure are disclosed. In accordance with the present disclosure, a user equipment (UE) may initiate an attachment procedure with a network over a non-access stratum (NAS) layer and detect a condition that may delay completion of the attachment. Based on the detection, the UE may determine whether the condition may be resolved before failure in the attachment procedure. If the UE determines that the condition can be resolved before attachment failure, the UE may suspend a timer associated with the attachment procedure at the NAS layer to allow more time for the UE to complete an authentication associated with the attachment. Conversely, if the UE determines that the condition cannot be resolved before attachment failure, the UE may abort the attachment procedure with the network and initiate a fallback attachment procedure with the network via a different base station.Type: ApplicationFiled: April 16, 2015Publication date: October 20, 2016Inventors: Juan ZHANG, Ajith Tom PAYYAPPILLY, Vinay PARADKAR, Ramachandran SUBRAMANIAN, Vitaly DRAPKIN, Cogol TINA, Nathan Edward TENNY
-
Publication number: 20160135049Abstract: Various aspects described herein relate to establishing services in wireless communications. A service request related to establishing a service over an established radio bearer can be transmitted. An authentication failure for the service request can be detected. It can be determined whether a procedure related to the service request is successfully completed. In can also be determined whether to terminate the established radio bearer based at least in part on the determination of whether the procedure related to the service request is successfully completed.Type: ApplicationFiled: October 30, 2015Publication date: May 12, 2016Inventors: Ankit BANAUDHA, Zhong Ren, Lenaig Chaponniere, Cogol Tina, Arvind Santhanam, Vitaly Drapkin