H04L2209/80

SUBSCRIPTION CONCEALED IDENTIFIER PRIVACY
20220408243 · 2022-12-22 ·

A user equipment (“UE”) in a wireless communication network can generate a padded identifier by inserting a padding bitstring in a field of an identifier associated with the UE. The UE can further encrypt the padded identifier to generate a concealed padded identifier. The UE can further transmit the concealed padded identifier to a network node operating in the wireless communication network.

BLOCKCHAIN-BASED METHOD AND SYSTEM FOR SECURING A NETWORK OF VIRTUAL WIRELESS BASE STATIONS
20220405384 · 2022-12-22 ·

Disclosed is a system for securing a wireless telecommunications network that is capable of distributing licensed capacity (in the form of connection licenses) to respond to localized fluctuations in demand. The system includes a master license server and a plurality of local license servers. The local license servers are coupled to a plurality of virtual wireless base stations over a bus. Each of the local license servers has a blockchain implementation that secures the virtual wireless base stations. For example, the blockchain implementation logs each transaction in which connection licenses change ownership among the virtual wireless base stations.

AUTOMATIC ASSOCIATION OF A NON-MEDICAL DEVICE WITH A MEDICAL DEVICE
20220408267 · 2022-12-22 ·

Techniques disclosed herein relate to automatic association of a non-medical device with a medical device. In some embodiments, the techniques involve accessing a user account provided by a cloud-based service, retrieving first identification information that is stored to the user account and identifies a medical device via the cloud-based service, receiving second identification information from the medical device, and establishing a secure communication link with the medical device based on determining that the second identification information corresponds to or matches the first identification information.

QUANTUM AUTHENTICATION FOR WIRELESS USER EQUIPMENT (UE)
20220408248 · 2022-12-22 ·

A wireless communication network performs quantum authentication for a wireless User Equipment (UE). In the wireless communication network, quantum circuitry selects polarization states for qubits, generates and transfers the qubits, exchanges cryptography information with edge quantum circuitry, generates cryptography keys based on polarization states and cryptography information, and transfers the cryptography keys to network authentication circuitry. The edge quantum circuitry receives and process the qubits, determines the polarization states for the qubits, exchanges the cryptography information with the network quantum circuitry, generates the cryptography keys based on the polarization states and cryptography information, and transfers the cryptography keys to the wireless UE. The wireless UE generates authentication data based on the cryptography keys and wirelessly transfers the authentication data for delivery to the network authentication circuitry. The network authentication circuitry receives the cryptography keys and the authentication data and responsively authenticates the wireless UE.

Method for remote subscription management of an eUICC, corresponding terminal
11533611 · 2022-12-20 · ·

Remote subscription management of an eUICC comprising a private key and a public certificate, the public certificate comprising information allowing a subscription manager server to decide if it can agree to manage the eUICC. The method includes: establishing a secure channel between the terminal and the subscription manager server by using the public certificate and dedicated cryptographic services of the eUICC; sending to the subscription manager server a subscription management request; verifying, based on the information in the public certificate in the subscription manager server, whether the eUICC is entitled to be managed by the subscription manager server and, if yes: performing a key establishment procedure between the subscription manager server and the eUICC by using the eUICC public certificate; establishing between the subscription manager server and the eUICC a secure channel with the established keys; and, executing by the subscription manager server the subscription management request on the eUICC.

Signal and/or data transmission and/or encryption unit, PRN code generator, integrated integrity check, and computer-aided method for secure signal transmission
11533165 · 2022-12-20 · ·

Signal, data transmission, and/or encryption units generating a cryptographic code using a cryptographic key before writing to a pseudorandom noise buffer memory. The PRN code generator comprises a first processor generating a PRN code from initial data using a cryptographic key. A second processor generates sections of the PRN code for integrity check purposes through computation using the same cryptographic key and initial data. Within the PRN code generator and before temporary storage of the PRN code in the buffer memory, there is a comparison device for comparing at least one duplicated section of the PRN code sequence cryptographically generated by the first processor with the section computed by the second processor. A blocking, stop and/or alarm function is activated in the comparison device and triggered on the basis of a predefined degree of matching between the section obtained through duplication and the computed section.

Validating telephone calls by verifying entity identities using blockchains
11533396 · 2022-12-20 · ·

Telephone calls can be validated using blockchains. In one example, a computing node can generate a distributed ledger indicating relationships between telephone numbers and unique identifiers assigned to the telephone numbers. The distributed ledger can be accessible to a telecommunication system for validating telephone calls.

COMMUNICATION DEVICES AND OPERATING METHODS

A communication device is provided, comprising: an ultra-wideband device configured to establish a communication session with an external communication device; a secure element configured to generate a session key for use in said communication session and an authentication key derived from said session key; a processing unit configured to execute an application; wherein the secure element is further configured to transfer the session key and the authentication key to the UWB device; wherein the UWB device is configured to add, upon or after receiving data for use by said application, a cryptographic tag to said data; wherein the processing unit is configured to receive said data and the cryptographic tag, and to forward said data and cryptographic tag to the secure element; wherein the secure element is configured to verify said cryptographic tag and to return, upon or after a positive verification of the cryptographic tag, a signed confirmation.

E-CIGARETTE AND AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD FOR E-CIGARETTE
20220398602 · 2022-12-15 ·

An authentication system and authentication method for an electronic cigarette and an electronic cigarette configured to be connected within such system so that the authentication method can be applied to the electronic cigarette. The system can be divided into 3 main components, namely the electronic cigarette itself, a mobile terminal in communication with the electronic cigarette and reading a security label from the electronic cigarette, and a service terminal connected to the mobile terminal, for instance through the cloud. The system and method protects particularly from counterfeit cartridges and secures that a cartridge of the intended content is connected in the electronic cigarette. In addition, age verification can be performed.

Method for transmitting to a physical or virtual element of a telecommunications network an encrypted subscription identifier stored in a security element, corresponding security element, physical or virtual element and terminal cooperating with this security element
11528604 · 2022-12-13 · ·

The invention concerns a method for transmitting to a physical or virtual element of a telecommunications network, an encrypted subscription identifier stored in a security element, or an encrypted identifier of the security element or an encrypted identifier of a terminal cooperating with the security element. The method includes pre-calculating proactively, at the occurrence of an event, the encrypted identifier using a key and storing it in a file or memory of the security element with a parameter enabling the key to be calculated by the element of the telecommunications network, in order to be able to transmit to the element of the telecommunications network the encrypted identifier and the parameter, without having to compute the encrypted identifier when the terminal is asking for it.