US 11,950,099 B2
Techniques for protecting control information
Anantharaman Balasubramanian, San Diego, CA (US); Hong Cheng, Basking Ridge, NJ (US); Shuanshuan Wu, San Diego, CA (US); Junyi Li, Fairless Hills, PA (US); and Kapil Gulati, Belle Mead, NJ (US)
Assigned to QUALCOMM Incorporated, San Diego, CA (US)
Filed by QUALCOMM Incorporated, San Diego, CA (US)
Filed on Dec. 16, 2021, as Appl. No. 17/644,683.
Prior Publication US 2023/0199494 A1, Jun. 22, 2023
Int. Cl. H04W 12/106 (2021.01); H04W 12/02 (2009.01); H04W 12/069 (2021.01); H04W 72/20 (2023.01)
CPC H04W 12/106 (2021.01) [H04W 12/02 (2013.01); H04W 12/069 (2021.01); H04W 72/20 (2023.01)] 24 Claims
OG exemplary drawing
 
1. A method of wireless communication performed by a receiver user equipment (UE), comprising:
receiving at least one control communication that includes a first part and a second part;
determining an authenticity status of the at least one control communication based at least in part on at least one message authentication code (MAC), the MAC is based at least in part on a common security key corresponding to the first part or a private security key corresponding to the second part, the at least one control communication includes a first sidelink control information (SCI) communication and a second SCI communication, and the at least one MAC includes a first MAC corresponding to the first SCI communication and a second MAC corresponding to the second SCI communication; and
performing a wireless communication task based at least in part on the authenticity status of the at least one control communication.