Patents by Inventor Prajwol Kumar Nakarmi

Prajwol Kumar Nakarmi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220303775
    Abstract: The present disclosure relate to a method performed by a UE (102) for handling an invalid SI signature in a communication system. The UE obtains SI and an associated SI signature for a cell. The UE (102) determines if the obtained SI signature is valid or invalid. If the signature is valid, the UE (102) determines to use the cell. If the SI signature is invalid, the UE (102) determines if the UE (102) is configured to bar cells or not. If the SI signature is invalid and if the UE (102) is not configured to bar cells with invalid SI signature, the UE (102) determines to use the cell. If the SI signature is invalid and the UE (102) is configured to bar cells with invalid SI signature, the UE (102) determines to bar the cell and select another cell to use.
    Type: Application
    Filed: May 26, 2020
    Publication date: September 22, 2022
    Inventors: Oscar Ohlsson, Prajwol Kumar Nakarmi, Icaro Leonardo Da Silva
  • Publication number: 20220272539
    Abstract: The present disclosure relates to a method performed by a UE (102) for handling validity of a SI signature in a com-munication system. The UE (102) obtains, from an access node (103, 104), SI and an associated SI signature for a cell served by the access node (103, 104) and which the UE (102) can use. The UE (102) determines if the obtained SI signature is valid or invalid. The UE (102) determines that the cell is valid if the SI signature is determined to be valid. The UE (102) determines that the cell is invalid if the SI signature is determined to be invalid. The UE (102) provides information indicating the invalid cell to the access node (103, 104) or to another node if the SI signature is determined to be invalid.
    Type: Application
    Filed: May 26, 2020
    Publication date: August 25, 2022
    Inventors: Icaro Leonardo Da Silva, Prajwol Kumar Nakarmi, Oscar Ohlsson
  • Publication number: 20220272534
    Abstract: A method performed by a UE. The method incudes generating a SUCI comprising: i) an encrypted part in which a Mobile Subscription Identification Number of a SUPI is encrypted and ii) a clear-text part comprising: a) a Mobile Country Code of the SUPI, b) a Mobile Network Code of the SUPI, c) a public key identifier for a public key of a home network of the user equipment, and d) an encryption scheme identifier that identifies an encryption scheme used by the UE to encrypt the Mobile Subscription Identification Number in the SUCI. The method also includes transmitting the SUCI to an authentication server in the home network for forwarding of the SUCI to a de-concealing server capable of decrypting the Mobile Subscription Identification Number.
    Type: Application
    Filed: May 5, 2022
    Publication date: August 25, 2022
    Applicant: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Vesa Torvinen, Noamen Ben Henda, David Castellanos Zamora, Prajwol Kumar Nakarmi, Pasi Saarinen, Monica Wifvesson
  • Publication number: 20220256337
    Abstract: The embodiments herein relate to a method performed by a UE (103) for handling SI. The UE obtains one or multiple public keys for SI signature verification. Each of the one or multiple public keys is associated with a validity area of an access network where the public key is valid. The UE obtains a SI together with a SI signature from a network node (101) covering a cell. The SI comprises area identification information. The UE determines (103), based on the area identification information comprised in the SI, the validity area that the cell belongs to and the corresponding public key. The UE (103) verifies the SI signature using the determined corresponding public key.
    Type: Application
    Filed: May 20, 2020
    Publication date: August 11, 2022
    Inventors: Oscar Ohlsson, Prajwol Kumar Nakarmi, Vlasios Tsiatsis
  • Patent number: 11399277
    Abstract: In order to ensure that a Subscription Concealed Identifier, SUCI, is calculated in the Universal Subscriber Identity Module, USIM, part of a User Equipment, UE, when intended, when a SUCI-Calculation-Indicator is set to a value indicating that the SUCI should be calculated in the USIM, a network node sets proprietary information, which is not known to a Mobile Equipment, ME, part of the UE, as required for calculation of the SUCI. The USIM facilitates calculation of the SUCI in the ME part of the UE only when the SUCI-Calculation-Indicator is set to a value indicating that the SUCI should be calculated in the ME. When the SUCI-Calculation-Indicator is set to a value indicating that the SUCI should be calculated in the USIM, the ME part deletes any locally stored information required for calculation of the SUCI.
    Type: Grant
    Filed: November 5, 2020
    Date of Patent: July 26, 2022
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Prajwol Kumar Nakarmi, Pasi Saarinen, Monica Wifvesson
  • Patent number: 11381387
    Abstract: Methods, network nodes, computer programs, carrier and user equipment, wherein a proof-of-presence in communications between private land mobile networks (PLMNs) is presented. In an example method performed by a network node in a home public land mobile network (HPLMN) of a user equipment (UE), the network node obtains, from a visited public land mobile network (VPLMN), a proof-of-presence indicator that represents the UE as being present in the VPLMN. The network node verifies whether or not the UE is present in the VPLMN by determining whether or not the proof-of-presence indicator was generated by the UE using a secret shared between the UE and at least the HPLMN. Upon verification of the presence of the UE in the VPLMN, sensitive information can be communicated by the HPLMN to the VPLMN.
    Type: Grant
    Filed: July 25, 2017
    Date of Patent: July 5, 2022
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Prajwol Kumar Nakarmi, Noamen Ben Henda, Christine Jost, Vesa Lehtovirta, Vesa Torvinen
  • Publication number: 20220210121
    Abstract: A wireless device requests a network slice from a network by, first, identifying at least one network slice to be requested. Based on a mapping method that is specific to the wireless device, the wireless device forms a slice pseudonym for the or each network slice to be requested. The wireless device then transmits a request message to the network, wherein the request message comprises the or each slice pseudonym. The network node receives the request message sent by the wireless device, wherein the request message comprises at least one slice pseudonym. Based on a mapping method that is used by the wireless device and that is specific to the wireless device, the network node identifies at least one requested network slice from the or each received slice pseudonym. The network node then permits use of the requested network slice.
    Type: Application
    Filed: January 7, 2022
    Publication date: June 30, 2022
    Applicant: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Pasi SAARINEN, Prajwol Kumar NAKARMI
  • Publication number: 20220173911
    Abstract: The present disclosure relates to a method performed by a UE (103) for handling signing of system information (SI). The UE (103) obtains, from a network node (101), a first indication which indicates that a first network (100a) is adapted to sign the SI. The signed SI is signed by the first network (100a) using a signature.
    Type: Application
    Filed: February 11, 2020
    Publication date: June 2, 2022
    Inventors: Oscar Ohlsson, Jens Bergqvist, Prajwol Kumar Nakarmi
  • Publication number: 20220167169
    Abstract: The present disclosure relates to a method performed by a UE (103) in a communications system (100). The UE (103) provides information indicating its SI protection capability to a node (101, 105). The SI protection capability is associated with the UE's (103) capability and need to verify SI signatures. The UE (103) obtains SI protection information from the node (101, 105), and uses the SI protection information.
    Type: Application
    Filed: April 9, 2020
    Publication date: May 26, 2022
    Inventors: Prajwol Kumar Nakarmi, Oscar Ohlsson
  • Publication number: 20220167153
    Abstract: A method performed by a mobile terminal for verifying at least one privacy profile setting for positioning of the mobile terminal to a location network node in a communications network is provided. The method includes receiving a request from the location network node for the mobile terminal to provide a position of the mobile terminal. The method further includes checking the at least one privacy profile setting of the mobile terminal for permission to provide position information of the mobile terminal. The method further includes determining whether to send the positioning information of the mobile terminal to the location network node based on the checking the at least one privacy profile setting. Methods performed by a network node are also provided.
    Type: Application
    Filed: March 3, 2020
    Publication date: May 26, 2022
    Inventors: Prajwol Kumar NAKARMI, Åke BUSIN, David CASTELLANOS ZAMORA, Christine JOST
  • Publication number: 20220159466
    Abstract: There is provided a method in a target network node for performing early data transmission (EDT) when a wireless device has suspended a connection from a source network node. The method comprises: receiving ciphered data from a first network node; sending a message to the wireless device, the message comprising the ciphered data; and in response to the sent message, receiving a message from the wireless device, the message allowing the target network node to retrieve a User Equipment (UE) context of the wireless device from the source network node.
    Type: Application
    Filed: April 14, 2020
    Publication date: May 19, 2022
    Applicant: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Dung PHAM VAN, Magnus STATTIN, Prajwol Kumar NAKARMI, Tuomas TIRRONEN
  • Publication number: 20220150691
    Abstract: A method and apparatus for a first IAB node for securely communicating with at least one second IAB node is provided. A secure connection with a node of a network is established. A message is received, from the node, indicating a secure messaging protocol to use to communicate with the at least one second IAB node, the message including one of at least one nonce or a key. A control message to be sent to the at least one second IAB node is transformed into a secure control message using the secure messaging protocol. The secure control message is transmitted to the at least one second IAB node.
    Type: Application
    Filed: January 3, 2020
    Publication date: May 12, 2022
    Inventors: Oumer TEYEB, Gunnar MILDH, Prajwol Kumar NAKARMI
  • Publication number: 20220150667
    Abstract: A method performed by a mobile terminal is provided for supporting positioning of the mobile terminal. The method includes receiving a defined filter pattern from a network node in a communications network or another node of the communications network, discovering identities of a plurality of reference devices based on signals received from the plurality of reference devices, filtering the identities of the plurality of reference devices to obtain a subset of identities of the plurality of reference devices that each satisfy the defined filter pattern, and reporting information on the subset of the identities of the plurality of reference devices to the network node.
    Type: Application
    Filed: January 17, 2020
    Publication date: May 12, 2022
    Inventors: Prajwol Kumar Nakarmi, Åke Busin, Fredrik Gunnarsson
  • Patent number: 11330433
    Abstract: A method performed by an authentication server for provisioning a user equipment (1), UE. The method comprises: obtaining a message authentication code, MAC, based on a provisioning key specific to the UE to the UE and a privacy key of a home network (3) of the UE, wherein the provisioning key is a shared secret between the authentication server (14) and the UE and the privacy key comprises a public key of the home network; and transmitting the privacy key and the MAC to the UE. Methods performed by a de-concealing server and the UE, respectively are also disclosed as well as authentication servers, de-concealing servers and UEs. A computer program and a memory circuitry (13) are also disclosed.
    Type: Grant
    Filed: July 17, 2018
    Date of Patent: May 10, 2022
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Vesa Torvinen, Noamen Ben Henda, David Castellanos Zamora, Prajwol Kumar Nakarmi, Pasi Saarinen, Monica Wifvesson
  • Publication number: 20220116784
    Abstract: A method performed by a wireless device includes receiving a Radio Resources Control Reject (RRCReject) message and determining whether to act on the RRCReject message based on a configuration of the wireless device. The method may also include receiving a configuration message that includes the configuration from a network node.
    Type: Application
    Filed: January 21, 2020
    Publication date: April 14, 2022
    Inventors: Icaro L.J. Da Silva, Magnus Stattin, Gunnar Mildh, Prajwol Kumar Nakarmi
  • Patent number: 11297072
    Abstract: Embodiments herein relate to a method performed by a detecting node (101) in a communications network (100), for detecting that a wireless device, WD, (120) associated with a first domain of the communications network (100) has been communicating with a non-legitimate device (150). The non-legitimate device (150) is a device associated with a second domain of the communications network (100). The non-legitimate device (150) impersonates a network node (110, 111, 140) of a first domain of the communications network (100). The detecting node (101) obtains information regarding one or more protocol events related to the communication between the WD (120) and a first network node (110, 111, 140). The information comprises a time instance related to the one or more protocol events. The detecting node (101) determines, based on the time instance and a set of time limits related to the one or more protocol events, that the WD (120) has been communicating with the non-legitimate device (150).
    Type: Grant
    Filed: July 19, 2016
    Date of Patent: April 5, 2022
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Prajwol Kumar Nakarmi, András Méhes, Karl Norrman
  • Patent number: 11284250
    Abstract: A communication device, network node and methods therein in for handling network slices in a wireless communication network are disclosed. The communication device encrypts Network Slice Selection Assistance information, NSSAI, using public key cryptography and includes the encrypted NSSAI in a Non Access Stratum, NAS, registration request. Then the communication device sends a Radio Resource Control, RRC, request to the network node including the NAS registration request. The network node receives the RRC connection request from the communication device and selects a network function based on information in the RRC connection request. The network node forwards the NAS registration request to the network function and forwards to the communication device a NAS registration response received from the network function after the network function decrypting the NSSAI using a PLMN private key.
    Type: Grant
    Filed: June 4, 2018
    Date of Patent: March 22, 2022
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Oscar Ohlsson, Peter Hedman, Prajwol Kumar Nakarmi, Paul Schliwa-Bertling
  • Publication number: 20220086706
    Abstract: Core network equipment is configured for use in a core network of a wireless communication system. The core network equipment is configured to switch switching to using a new non-access stratum, NAS, security context between a user equipment and the core network equipment. The core network equipment is also configured to, during or in association with a handover procedure for handover of the user equipment, signal from the core network equipment that the new NAS security context between the user equipment and the core network equipment is to be used as a basis for an access stratum (AS) security context between the user equipment and radio access network equipment.
    Type: Application
    Filed: November 23, 2021
    Publication date: March 17, 2022
    Inventors: Prajwol Kumar Nakarmi, Karl Norrman, Monica Wifvesson
  • Publication number: 20220086620
    Abstract: A method of operating a network device in a serving network for providing regulation compliant privacy in a communications network is provided. Operations of such methods include obtaining a concealed subscription identifier from a user equipment, UE, that is associated with a home network, HN, obtaining a permanent subscription identifier that is associated with the concealed subscription identifier from the HN, determining whether the concealed subscription identifier from the UE corresponds to the permanent subscription identifier from the HN, and responsive to determining that the concealed subscription identifier from the UE corresponds to the permanent subscription identifier from the HN, performing further operations to provide service to the UE.
    Type: Application
    Filed: January 21, 2020
    Publication date: March 17, 2022
    Inventors: Prajwol Kumar NAKARMI, Helena VAHIDI MAZINANI
  • Publication number: 20220060325
    Abstract: Systems and methods are described for redirecting a user equipment with a routing misconfiguration. An exemplary method includes detecting a potential misconfiguration associated with the user equipment or a subscriber identity module (SIM) associated with the user equipment and generating an error code indicating the potential misconfiguration associated with the user equipment of the SIM associated with the user equipment. The error code is transmitted to an authentication module and indicates that the misconfiguration is an incorrect routing identifier and includes additional user information.
    Type: Application
    Filed: September 24, 2019
    Publication date: February 24, 2022
    Inventors: David Castellanos ZAMORA, Prajwol Kumar Nakarmi, Peter Hedman, Jesus Angel De Gregorio RODRIGUEZ