Patent classifications
H04W12/00
Vehicle messaging
A central computer includes a first processor and a first memory. A portable computer includes a second processor and a second memory. The portable computer is programmed to: obtain an identifier of a vehicle via a scanner included in the portable computer, and transmit the identifier and first validation data to the central computer, and transmit a message to the central computer for a destination computer. The central computer is programmed to receive the identifier and the first validation data from the portable computer, determine second validation data; identify a destination computer based on the identifier, and upon determining that a comparison of the first validation data and the second validation data meets a specified criterion, transmit the message from the portable computer to the destination computer.
MEC-based distributed computing environment with multiple edge hosts and user devices
Various systems and methods for enhancing a distributed computing environment with multiple edge hosts and user devices, including in multi-access edge computing (MEC) network platforms and settings, are described herein. A device of a lifecycle management (LCM) proxy apparatus obtains a request, from a device application, for an application multiple context of an application. The application multiple context for the application is determined. The request from the device application for the application multiple context for the application is authorized. A device application identifier based on the request is added to the application multiple context. A created response for the device application based on the authorization of the request is transmitted to the device application. The response includes an identifier of the application multiple context.
Early frequency reporting for fast setup of carrier aggregation or dual connectivity
A method and apparatus for early frequency reporting for fast carrier aggregation (CA) and/or dual connectivity (DC) setup in a wireless communication system is provided. A wireless device reports, to a network, information informing that a neighbor frequency can be aggregated with a serving frequency using one of 1) carrier aggregation (CA), 2) dual connectivity (DC), or 3) both CA and DC.
Verification system
A device includes memory and a processor. The device receives biometric information. The device receives location information. The device analyzes the received biometric information with stored biometric information. The device analyzes the received location information with stored location information. The device determines whether the received biometric information matches the stored biometric information. The device determines whether the received location information matches the stored location information. The device sends an electronic communication that indicates whether the received biometric information matches the stored biometric information and whether the received local information matches stored geographic location that is not within a particular distance of another geographic location.
Tracking device operation in safety-classified zone
Tracking devices can be associated with safe zones, smart zones, and high risk zones. Safe zones correspond to regions where a likelihood that a tracking device is lost within the safe zone is lower than outside the safe zone. High risk zones correspond to regions where a likelihood that a tracking device is lost within the high risk zone is higher than outside the high risk zone. Smart zones correspond to an expected tracking device, mobile device, or user behavior. Home areas are geographic regions in which a user resides, and travel areas are geographic regions in which a user does not reside. A tracking device can be configured to operate in a mode selected based on a presence of the tracking device within a safe zone, a smart zone, a high risk zone, a home area, or a travel area.
Tracking device operation in safety-classified zone
Tracking devices can be associated with safe zones, smart zones, and high risk zones. Safe zones correspond to regions where a likelihood that a tracking device is lost within the safe zone is lower than outside the safe zone. High risk zones correspond to regions where a likelihood that a tracking device is lost within the high risk zone is higher than outside the high risk zone. Smart zones correspond to an expected tracking device, mobile device, or user behavior. Home areas are geographic regions in which a user resides, and travel areas are geographic regions in which a user does not reside. A tracking device can be configured to operate in a mode selected based on a presence of the tracking device within a safe zone, a smart zone, a high risk zone, a home area, or a travel area.
DEVICE ESTABLISHING SECURITY SESSION FOR V2X SERVICE
Provided is a device establishing a security session for a vehicle-to-everything (V2X) service. The device transmits a ping request message requesting establishment of the security session to a V2X server. The ping request message includes a certificate based on the Institute of Electrical and Electronics Engineers (IEEE) 1609.2 and a session identifier (ID) for the security session. The device receives, from the V2X server, a ping response message as a response to the ping request message.
PHYSICAL LAYER SECURITY WITH COMPONENT CARRIER SWITCHING
The base station may transmit, to a UE, a configuration of a set of secure RSs for each CC of a set of CCs and at least one RE, and instruct the UE to select a subset of CCs from a set of CCs. The base station and the UE may measure the set of secure RS across the at least one RE, and select the subset of CCs from the set of CCs based on the measurement. The base station and the UE may communicate with each other on the subset of CCs. The base station and the UE may communicate with each other on a first CC of the subset of CCs, and switch the CC from the first CC to a second CC of the subset of CCs to communicate with each other, based on a number of ACKs/NACKs transmitted or a pattern.
Vehicle access based on RF digests/backgrounds
According to certain examples, a circuit-based wireless communications system provides secure access to a vehicle by way of certain circuitry configure to compare a first RF background observed for a vehicle-located RF receiver that is part of a vehicle-located circuit secured to a vehicle, with a second RF background observed for a wireless-communications vehicle-access circuit that includes another RF receiver. In response, a distance metric is generated to indicate a degree of similarity between the first RF background and the second RF background, and based on whether this metric satisfies a threshold, access to the vehicle may be granted via the wireless-communications vehicle-access circuit.
GPS-attack prevention system and method for fine timing measurement (FTM) in 802.11AZ
Presented herein are techniques for GPS attack prevention in association with wireless communication devices. In at least one embodiment, a method may include receiving, at a mobile device from a first access point (AP), first location information and one or more of a first token or first neighbor information relating to neighboring APs. The mobile device may receive from a second AP, second location information and one or more of a second token or second neighbor information relating to neighboring APs. The first token may be compared to the second token to determine whether the first and second tokens are consistent, and/or the first neighbor information may be compared to the second neighbor information to determine whether the first and second neighbor information are consistent. It may be determined whether the first location information provided by the first AP and the second location information provided by the second AP are valid based on the comparison(s).