Patents by Inventor Soo Bum Lee

Soo Bum Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210067265
    Abstract: Methods for detecting and responding to detecting a non-benign network entity (e.g., jammer, etc.) that targets physical layer channels in a communication network. A wireless device may receive a physical downlink control channel (PDCCH) and a demodulation reference signal (DMRS) from a network entity, determine radio signal strength indicator (RSSI) for the received PDCCH, determine a signal to noise ratio (SNR) for the DMRS, determine whether the RSSI satisfies a first threshold, and determine whether the DMRS SNR satisfies a second threshold.
    Type: Application
    Filed: August 28, 2020
    Publication date: March 4, 2021
    Inventors: Ravi AGARWAL, Gavin Bernard Horn, Soo Bum Lee, Naga Bhushan, Ozcan Ozturk
  • Publication number: 20210067958
    Abstract: A user equipment (UE) may receive a quality of service (QoS) flow for a multicast or broadcast service that is secured with a multicast-broadcast key. The UE may transmit a data session establishment request to a service management function (SMF) for the multicast or broadcast service. The UE may receive at least one multicast-broadcast key for the PDU session. The UE may determine a radio bearer (RB) configuration for the multicast or broadcast service. The UE may receive one or more QoS flow packets for the multicast or broadcast service over the RB. The UE may decode the one or more QoS flow packets using the at least one multicast-broadcast key, or a key derived from the at least one multicast-broadcast key. Decoding may include decrypting, verifying the integrity, or a combination thereof.
    Type: Application
    Filed: August 13, 2020
    Publication date: March 4, 2021
    Inventors: Soo Bum LEE, Miguel GRIOT, Gavin Bernard HORN
  • Publication number: 20210067960
    Abstract: A user equipment (UE) may update multicast-broadcast key for securing a data session for a multicast or broadcast service. The UE may receive a multicast-broadcast key for the for a multicast or broadcast service carried by a radio bearer (RB) associated with the data session. The UE may receive packets for the multicast or broadcast service. The UE may decode the packets using the multicast-broadcast key, or a key derived from the multicast-broadcast key. The UE may receive an updated multicast-broadcast key for the multicast or broadcast service. The UE may decode the packets for the multicast or broadcast service received on the RB using the updated multicast-broadcast key, or a key derived from the updated multicast-broadcast key.
    Type: Application
    Filed: August 13, 2020
    Publication date: March 4, 2021
    Inventors: Soo Bum LEE, Miguel GRIOT, Gavin Bernard HORN
  • Patent number: 10936105
    Abstract: A touch sensor includes a base, first sensing electrode columns (FSECs), and second sensing electrode columns (SSECs). The base includes a sensing region (SR) including a rounded corner (RC), and a non-SR outside the SR. The FSECs extend in a direction on the base, each FSEC among the FSECs including first sensing electrodes (FSEs), each FSE among the FSEs including sub-electrodes. The SSECs are alternately disposed with the FSECs on the base, each SSEC among the SSECs including second sensing electrodes (SSEs). Sub-electrodes of one of adjacent FSEs among the FSEs are electrically connected to respective sub-electrodes of another of the adjacent FSEs. A sub-electrode closest to the RC among the sub-electrodes includes a rounded edge (RE) corresponding to the RC. A SSE closest to the RC among the SSEs includes a RE corresponding to the RC, and a protrusion part protruding toward the sub-electrode including the RE.
    Type: Grant
    Filed: March 2, 2020
    Date of Patent: March 2, 2021
    Assignee: Samsung Display Co., Ltd.
    Inventors: Gwang Bum Ko, Soo Jung Lee, Jeong Yun Han
  • Publication number: 20210058792
    Abstract: Aspects of the present disclosure describe scrambling of information for wireless communications to prevent deciphering or altering by unintended recipients. An example method may include generating, by a first device, a scrambling key based on at least one of a freshness parameter or a private key. The private key is known by the first device and a second device. The method also includes scrambling a payload based on the scrambling key at a physical layer. A packet includes the payload for wireless transmission from the first device to the second device via a shared channel.
    Type: Application
    Filed: August 19, 2020
    Publication date: February 25, 2021
    Inventors: Naga BHUSHAN, Gavin Bernard HORN, Soo Bum LEE, Ozcan OZTURK, Ravi AGARWAL
  • Patent number: 10897507
    Abstract: Certain aspects of the present disclosure relate to methods and apparatus enabling connectivity session and internet protocol (IP) establishment. An exemplary method generally generating a request to establish at least one data network (DN) session for providing connectivity between the UE and a DN, wherein the at least one DN session supports a plurality of data sessions for enabling communication between one or more local endpoints in the UE and one or more endpoints in the DN, wherein each data session of the plurality of data sessions supports one or more connectivity requirements specified by the UE, wherein a first data session of the plurality of data sessions is associated with a first gateway, and wherein a second data session of the plurality of data sessions is associated with a second gateway, and transmitting the request to establish the at least one DN session.
    Type: Grant
    Filed: December 15, 2016
    Date of Patent: January 19, 2021
    Assignee: QUALCOMM Incorporated
    Inventors: Stefano Faccin, Gavin Bernard Horn, Soo Bum Lee, John Wallace Nasielski
  • Patent number: 10880946
    Abstract: One feature pertains to a method that includes establishing a radio communication connection with a first radio access node (RAN) that uses control plane signaling connections to carry user plane data. The method also includes determining that the wireless communication device is experiencing radio link failure (RLF) with the first RAN and that the radio communication connection should be reestablished with a second RAN. A reestablishment request message is transmitted to the second RAN that includes parameters that enable a core network node communicatively coupled to the second RAN to authenticate the wireless communication device and allow or reject reestablishment of the radio communication connection. The parameters include at least a message authentication code (MAC) based in part on one or more bits of a non-access stratum (NAS) COUNT value maintained at the wireless communication device.
    Type: Grant
    Filed: September 18, 2019
    Date of Patent: December 29, 2020
    Assignee: QUALCOMM Incorporated
    Inventors: Adrian Edward Escott, Mungal Singh Dhanda, Anand Palanigounder, Soo Bum Lee
  • Publication number: 20200404726
    Abstract: A user equipment (UE) may experience poor communication with a network access device, and the network access device may configure the UE to connect to, and route communications through, one or more relay nodes (e.g., which may be another UE, a network operator-deployed relay, etc.). Techniques are described whereby these relay nodes may autonomously form a wireless backhaul network. Sequential implementations are considered such that the size of the wireless backhaul network may scale efficiently. In some examples, the wireless backhaul network may form by reusing existing connectivity establishment procedures. Importantly, the proposed techniques enable a relay to possess (e.g., be configured with) functionality that may traditionally be associated with a UE, base station, and gateway. Such multi-faceted functionality may enable the described sequential formation of wireless backhaul networks with tree topology.
    Type: Application
    Filed: September 4, 2020
    Publication date: December 24, 2020
    Inventors: Karl Georg Hampel, Hong Cheng, Soo Bum Lee, Gavin Bernard Horn, Vincent Douglas Park
  • Publication number: 20200396647
    Abstract: In an aspect, the present disclosure includes a method, apparatus, and computer readable medium for wireless communications for configuring of a NAS COUNT value of a mapped EPS security context associated with an intersystem change of a UE from a 5G system to an EPS. The aspect may include generating, by a UE, a mapped EPS security context associated with an intersystem change of the UE from a 5G system to an EPS, wherein the mapped EPS security context comprises security parameters created based a 5G security context used for the 5G system, the security parameters enabling security-related communications between the UE and a network entity; determining an UL NAS COUNT value and the DL NAS COUNT value for the mapped EPS security context; and transmitting, by the UE, a NAS message to the network entity, the NAS message including the UL NAS COUNT value of the mapped EPS security context.
    Type: Application
    Filed: June 10, 2020
    Publication date: December 17, 2020
    Inventors: Soo Bum LEE, Adrian Edward Escott, Cogol Tina, Anand Palanigounder
  • Patent number: 10841084
    Abstract: Techniques are described that provide a session management authorization token by receiving a session request message to establish a protocol data unit (PDU) session for a logical data network associated with a user equipment (UE), the session request message may include one or more session parameters; verifying that the UE is authorized to establish the PDU session for the logical data network; receiving a key associated with the PDU session; generating an authorization token based on the received key and the session parameters; and transmitting a session response message including the generated authorization token to the UE.
    Type: Grant
    Filed: October 13, 2017
    Date of Patent: November 17, 2020
    Assignee: QUALCOMM Incorporated
    Inventors: Soo Bum Lee, Adrian Edward Escott, Anand Palanigounder
  • Publication number: 20200359222
    Abstract: Methods, systems, and devices for communications are described. A device or a group of devices may generate data. The group of devices may receive a group profile from a node that identifies the devices to be included, and the group profile may include a function to be evaluated at each of the devices. The node may also provision evaluation parameters which may allow the device to provide authenticated aggregate data to a requesting third party, without sharing the data between the devices and without sharing the data with the node, thus concurrently maintaining individual data privacy and data provenance.
    Type: Application
    Filed: May 4, 2020
    Publication date: November 12, 2020
    Inventors: Soo Bum Lee, Jay Rodney Walton, John Wallace Nasielski, Gavin Bernard Horn
  • Publication number: 20200356694
    Abstract: Methods, systems, and devices for wireless communications are described. Aspects may include receiving, at a device, a device configuration profile including one or more parameters for managing data transfers associated with a service and generating a transaction credential by which the data is to be associated in a storage. The transaction credential may be generated according to the configuration profile. Aspects may also include identifying, at the device, that data is to be stored in the storage that is associated with the service. Aspects include signing the data using the transaction credential and transmitting the signed data to the storage.
    Type: Application
    Filed: May 4, 2020
    Publication date: November 12, 2020
    Inventors: Soo Bum Lee, Jay Rodney Walton, John Wallace Nasielski, Gavin Bernard Horn
  • Publication number: 20200359207
    Abstract: Methods, systems, and devices for communications are described. A device or a group of devices may generate data. The group of devices may receive a group profile from a node that identifies the devices to be included, and the group profile may include a function to be evaluated at each of the devices. The node may also provision evaluation parameters which may allow the device to provide authenticated aggregate data to a requesting third party, without sharing the data between the devices, thus concurrently maintaining individual data privacy and data provenance.
    Type: Application
    Filed: May 4, 2020
    Publication date: November 12, 2020
    Inventors: Soo Bum Lee, Jay Rodney Walton, John Wallace Nasielski, Gavin Bernard Horn
  • Publication number: 20200358788
    Abstract: Methods, systems, and devices for wireless communications are described. Aspects include a device generating data to be sent to a receiving device and determining to provide provenance for the data. The device may generate a data identifier based on an identifier generation key and encrypt the data using an encryption key generated from a key associated with an owner of the device. The device may sign they encrypted data transmission using a signing key where the signing key is based on the encrypted data and the data identifier. In some cases, the device may send the data to a receiving device via one or more proxy devices. In some cases, multiple device may send signed data transmissions to a proxy device and the proxy device may process the multiple data transmission and send the processed data to the receiving device. The receiving device may verify provenance of the data.
    Type: Application
    Filed: May 4, 2020
    Publication date: November 12, 2020
    Inventors: Soo Bum Lee, Jay Rodney Walton, John Wallace Nasielski, Gavin Bernard Hom
  • Publication number: 20200351256
    Abstract: Certain aspects of the present disclosure provide techniques for managing security keys for enciphering and deciphering packets transmitted in a wireless communications system. According to certain aspects, a method of wireless communication by a user equipment (UE) is provided. The method generally includes obtaining an indication of a key area identifier (ID) of a first cell node, wherein the key area ID identifies a set of cell nodes that are associated with a network node that uses a first key for enciphering or deciphering messages and communicating a first set of messages with the first cell node using the first key for enciphering or deciphering the first set of messages.
    Type: Application
    Filed: July 22, 2020
    Publication date: November 5, 2020
    Inventors: Soo Bum LEE, Keiichi KUBOTA, Adrian Edward ESCOTT, Gavin Bernard HORN, Anand PALANIGOUNDER
  • Publication number: 20200351782
    Abstract: In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided that improve data packet exchange between a UE in an inactive mode and a network. In certain configurations, the apparatus may receive, from a user equipment (UE) in an active mode, a first packet including a first identifier associated with an anchor base station, a second identifier associated with a UE context, and a payload. The apparatus may identify the anchor base station based at least in part on one or more of the first identifier associated with the anchor base station or the second identifier associated with the UE context. The apparatus may transmit a second packet to the anchor base station. The second packet may include at least a portion of the first packet.
    Type: Application
    Filed: January 31, 2019
    Publication date: November 5, 2020
    Inventors: Keiichi KUBOTA, Gavin Bernard HORN, Soo Bum LEE, Huichun LIU
  • Publication number: 20200344611
    Abstract: Methods, systems, and devices for wireless communication are described. Generally, the described techniques provide for efficiently protecting communications between a base station and a UE with limited signaling and processing overhead. As described herein, a base station may generate a system information security container (SISC) including integrity information of one or more system information blocks (SIBs), and the base station may transmit (e.g., broadcast) the SISC with a signature to one or more UEs (e.g., to protect the integrity information of the SIBs in the SISC). Once a UE receives the SISC, the UE may verify the signature of the SISC, identify the system information included in the SISC (e.g., the system information included in the integrity information of the SIBs), and apply the system information for communications with the base station.
    Type: Application
    Filed: April 22, 2020
    Publication date: October 29, 2020
    Inventors: Soo Bum Lee, Gavin Bernard Horn
  • Publication number: 20200344605
    Abstract: A user equipment (UE) may receive system information from a base station and may calculate a hash value using the system information as input to a hashing function. Similarly, prior to transmitting the system information, a valid base station may calculate a hash value using the system information as input to a hashing function. The base station may transmit the calculated hash value (e.g., which represent or be included in a set of hash values) to the UE in an access stratum (AS) security mode command (SMC) message. The UE may determine whether the received system information was modified based on the hash value (e.g., by comparing the UE calculated hash value and the set of hash values received from the base station in the AS SMC). If the UE indicates a mismatch of hash information, the base station may re-transmit the system information (e.g., in an integrity protected message).
    Type: Application
    Filed: April 23, 2020
    Publication date: October 29, 2020
    Inventors: Soo Bum Lee, Adrian Edward Escott, Anand Palanigounder, Gavin Bernard Horn
  • Publication number: 20200344598
    Abstract: Various embodiments include methods, components and wireless devices configured to provide physical layer security in a communication system. In various embodiments, a wireless device processor may receive a first signature from a base station. The wireless device processor may determine a second signature based on the first signature. The wireless device processor may receive from the base station a communication that has been modified using a second signature determined by the base station. The wireless device processor may perform a matching operation to determine whether its second signature matches the second signature used to modify the base station communication. The wireless device processor may enable communications with the base station in response to determining that the second signature determined by its processor matches the second signature used to modify the communication.
    Type: Application
    Filed: April 10, 2020
    Publication date: October 29, 2020
    Inventors: Wooseok NAM, Tao Luo, Soo Bum Lee, Olufunmilola Omolade Awoniyi-Oteri
  • Publication number: 20200313984
    Abstract: A method, operational at a device, includes receiving at least one packet belonging to a first set of packets of a packet flow marked with an identification value, determining that the at least one packet is marked with the identification value, determining to change a quality of service (QoS) treatment of packets belonging to the first set of packets marked with the identification value that are yet to be received, and sending a request to change the QoS treatment of packets belonging to the first set of packets marked with the identification value that are yet to be received to trigger a different QoS treatment of packets within the packet flow, responsive to determining to change the QoS treatment. Other aspects, embodiments, and features are also claimed and described.
    Type: Application
    Filed: June 15, 2020
    Publication date: October 1, 2020
    Inventors: Soo Bum LEE, Stefano FACCIN, Haris ZISIMOPOULOS