CN-122003899-A - Wireless location security breach detection and prevention
Abstract
A first User Equipment (UE) may send a first ranging message. The second UE may receive the first ranging message. The second UE may calculate a Carrier Frequency Offset (CFO) based on the ranging message. The second UE may transmit a response message including control information for modifying the transmission protocol. The sending of the response message may be in response to the calculated CFO being greater than or equal to a threshold. The calculated CFO may indicate a possible security hole between the first UE and the second UE. The first UE may receive a response message including control information for modifying a transmission protocol after transmission of the first ranging message. The first UE may then send a second ranging message based on the control information. The second ranging message may prevent or mitigate a detected possible security breach.
Inventors
- V. A. Reddy
Assignees
- 高通股份有限公司
Dates
- Publication Date
- 20260508
- Application Date
- 20240923
- Priority Date
- 20231023
Claims (20)
- 1. An apparatus for wireless communication at a User Equipment (UE), the apparatus comprising: at least one memory, and At least one processor coupled to the at least one memory and configured, based at least in part on information stored in the at least one memory, alone or in any combination, to: Receiving a ranging message; calculating a Carrier Frequency Offset (CFO) based on the ranging message, and Transmitting a response message including control information for modifying a transmission protocol, wherein the transmission of the response message is responsive to the calculated CFO being greater than or equal to a threshold.
- 2. The apparatus of claim 1, wherein the control information comprises a set of frequency offsets.
- 3. The apparatus of claim 2, wherein the at least one processor, alone or in any combination, is further configured to: the set of frequency offsets is calculated based on a pseudo-random number generator.
- 4. The apparatus of claim 2, wherein the at least one processor, alone or in any combination, is further configured to: A second ranging message is received based on the set of frequency offsets.
- 5. The apparatus of claim 4, wherein the second ranging message comprises a plurality of preamble symbols, wherein each preamble symbol of the plurality of preamble symbols corresponds to a different frequency offset of the set of frequency offsets.
- 6. The apparatus of claim 5, wherein the control information comprises an indicator of a set of guard periods, wherein to receive the second ranging message, the at least one processor is configured to, alone or in any combination: The second ranging message is received further based on the set of guard periods.
- 7. The apparatus of claim 5, wherein the at least one processor, alone or in any combination, is further configured to: Calculating a set of CFOs based on the second ranging message and the set of frequency offsets, wherein each CFO of the set of CFOs corresponds to one of the plurality of preamble symbols; Processing a first subset of the plurality of preamble symbols corresponding to a first calculated CFO less than or equal to the threshold value, and Processing a second subset of the plurality of preamble symbols corresponding to a second calculated CFO greater than or equal to the threshold is avoided.
- 8. The apparatus of claim 1, wherein the control information comprises a set of code indices.
- 9. The apparatus of claim 8, wherein the at least one processor, alone or in any combination, is further configured to: the set of code indices is calculated based on a pseudo-random number generator.
- 10. The apparatus of claim 8, wherein the at least one processor, alone or in any combination, is further configured to: receiving a second ranging message based on the set of code indices, and At least one of the ranging message or the second ranging message that is not based on the set of code indices is ignored.
- 11. The apparatus of claim 10, wherein the second ranging message comprises a plurality of sets of preamble symbols, wherein each set of preamble symbols of the plurality of sets of preamble symbols corresponds to a different code index of the set of code indices.
- 12. The apparatus of claim 8, wherein each code index in the set of code indices comprises a tuple comprising: a first indicator of the beginning of the index; a second indicator of the end of the index, and A third indicator of a code used between the beginning and the ending of the index.
- 13. The apparatus of claim 1, wherein the control information comprises an indicator to modify the transmission protocol, wherein the at least one processor, alone or in any combination, is further configured to: Receiving a second ranging message including second control information, wherein the second control information includes a set of code indices, and A second response message is sent based on the set of code indices.
- 14. The apparatus of claim 13, wherein the second response message comprises a plurality of preamble symbol sets, wherein to transmit the second response message based on the code index set, the at least one processor is configured to, alone or in any combination: each set of preamble symbols of the plurality of sets of preamble symbols is transmitted based on a different code index of the set of code indices.
- 15. The apparatus of claim 14, wherein each code index in the set of code indices comprises a tuple comprising: a first indicator of the beginning of the index; a second indicator of the end of the index, and A third indicator of code, wherein to transmit each of the plurality of sets of preamble symbols based on the different ones of the set of code indices, the at least one processor is configured to, alone or in any combination: Each set of preamble symbols of the plurality of sets of preamble symbols is transmitted between the beginning and the ending of the index based on the code.
- 16. The apparatus of claim 1, wherein the sending of the response message is further responsive to the calculated CFO being greater than or equal to the threshold second threshold number of times.
- 17. The apparatus of claim 1, further comprising a transceiver coupled to the at least one processor, wherein the at least one processor, alone or in any combination, is further configured to: A first Ranging Initiation Message (RIM) is sent via the transceiver to initiate a positioning session, wherein the ranging message comprises a Ranging Response Message (RRM), wherein receipt of the RRM is responsive to the sending of the RIM.
- 18. The device of claim 1, wherein the ranging message comprises at least one of a Ranging Initiation Message (RIM) or a Ranging Response Message (RRM).
- 19. The apparatus of claim 1, wherein the response message comprises at least one of a Ranging Control Update Message (RCUM) or a Ranging Response Message (RRM).
- 20. An apparatus for wireless communication at a User Equipment (UE), the apparatus comprising: at least one memory, and At least one processor coupled to the at least one memory and configured, based at least in part on information stored in the at least one memory, alone or in any combination, to: Transmitting a first ranging message; receiving a response message including control information for modifying a transmission protocol after the transmission of the first ranging message, and A second ranging message is transmitted based on the control information.
Description
Wireless location security breach detection and prevention Cross Reference to Related Applications The present application claims the benefit of U.S. non-provisional patent application serial No. 18/492,711, entitled "SECURITY VULNERABILITY DETECTION AND PREVENTION FOR WIRELESS POSITIONING (wirelessly located security breach detection and prevention)" filed on day 10/23 of 2023, which is expressly incorporated herein by reference in its entirety. Technical Field The present disclosure relates generally to communication systems, and more particularly to wireless positioning systems. Background Wireless communication systems are widely deployed to provide various telecommunication services such as telephony, video, data, messaging, and broadcast. A typical wireless communication system may employ multiple-access techniques capable of supporting communication with multiple users by sharing the available system resources. Examples of such multiple-access techniques include Code Division Multiple Access (CDMA) systems, time Division Multiple Access (TDMA) systems, frequency Division Multiple Access (FDMA) systems, orthogonal Frequency Division Multiple Access (OFDMA) systems, single carrier frequency division multiple access (SC-FDMA) systems, and time division synchronous code division multiple access (TD-SCDMA) systems. These multiple access techniques have been employed in various telecommunications standards to provide a common protocol that enables different wireless devices to communicate at the urban, national, regional, and even global levels. One example telecommunications standard is 5G New Radio (NR). The 5G NR is part of the ongoing mobile broadband evolution promulgated by the third generation partnership project (3 GPP) to meet new requirements associated with latency, reliability, security, scalability (e.g., with the internet of things (IoT)) and other requirements. The 5G NR includes services associated with enhanced mobile broadband (eMBB), large-scale machine-type communications (mMTC), and ultra-reliable low-latency communications (URLLC). Some aspects of 5G NR may be based on the 4G Long Term Evolution (LTE) standard. Further improvements in the 5G NR technology are needed. Furthermore, these improvements may also be applicable to other multiple access techniques and telecommunication standards employing these techniques. Disclosure of Invention The following presents a simplified summary of one or more aspects in order to provide a basic understanding of such aspects. This summary is not an extensive overview of all contemplated aspects. This summary does not identify key or critical elements of all aspects nor delineate the scope of any or all aspects. Its sole purpose is to present some concepts of one or more aspects in a simplified form as a prelude to the more detailed description that is presented later. In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may include a User Equipment (UE). The apparatus may receive a ranging message. The apparatus may calculate a Carrier Frequency Offset (CFO) based on the ranging message. The apparatus may transmit a response message including control information for modifying a transmission protocol. The sending of the response message may be in response to the calculated CFO being greater than or equal to a threshold. In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may include a UE. The apparatus may send a first ranging message. The apparatus may receive a response message including control information for modifying a transmission protocol after transmission of the first ranging message. The apparatus may transmit a second ranging message based on the control information. To the accomplishment of the foregoing and related ends, one or more aspects may comprise the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative features of the one or more aspects. These features are indicative, however, of but a few of the various ways in which the principles of various aspects may be employed. Drawings Fig. 1 is a diagram illustrating an example of a wireless communication system and an access network. Fig. 2A is a diagram illustrating an example of a first frame in accordance with various aspects of the present disclosure. Fig. 2B is a diagram illustrating an example of a Downlink (DL) channel within a subframe according to various aspects of the present disclosure. Fig. 2C is a diagram illustrating an example of a second frame in accordance with various aspects of the present disclosure. Fig. 2D is a diagram illustrating an example of an Uplink (UL) channel within a subframe according to various aspects of the disclosure. Fig. 3 is a diagram illustrating an example of a base station and a User Equipment (UE) in