H04L2209/80

Updating a subscriber identity module
11503473 · 2022-11-15 · ·

Updating a subscriber identity module, SIM, on a host device by deriving a pre-shared key by requesting a SIM identifier via communication module of the host device; receiving SIM identifier and deriving an agent identifier from SIM identifier; transmitting agent and SIM identifiers to SIM update server; receiving a random value from SIM update server and supplying it to the SIM to initiate SIM authentication procedure. In reply, receiving an authentication response from the SIM; and deriving pre-shared key from authentication response; transmitting an update request message to SIM update server, wherein the update request message comprises the agent identifier and is encrypted before transmission using the pre-shared key; receiving an update response message from the SIM update server which has update data and is encrypted using pre-shared key; and following decryption of update response message using derived pre-shared key, transmitting update data to communication module.

RADIO LINK RECOVERY FOR USER EQUIPMENT
20230046112 · 2023-02-16 ·

In response to a radio link failure between given user equipment and a source access node of a communication system during a data transfer operation over a control plane, a method is provided for recovering the radio link for the given user equipment through a target access node of the communication system. The radio link recovery is enabled via a mobility management node of the communication system using a non-access stratum security context previously established between the given user equipment and the mobility management node.

Tool verification system and method of verifying an unqualified component

A tool verification system and a method of verifying an unqualified component includes receiving communications between a tool and an unverified component, comparing the communications with a previously-qualified set of communications, and determining whether the unqualified component can be qualified based on the comparison.

Wireless communication apparatus and method

According to one embodiment, a wireless communication apparatus includes a transmitter. The transmitter transmits, in a first period, a first information frame. The first information frame includes first, verification information and a first key usable in the first period. The transmitter transmits, in the first period and after transmitting the first information frame, a data frame including first data. The transmitter transmits, in the first period and after transmitting the first information frame, a second information frame. The data frame includes a fourth key usable in a second period following the first period. The transmitter transmits, in the second period, a third information frame including third verification information and the fourth key.

SYSTEMS AND METHODS FOR AUTHORIZING A TRANSACTION WITH AN UNEXPECTED CRYPTOGRAM
20220358513 · 2022-11-10 ·

Methods are described for performing a timely authorization of digital credential data delivered from a mobile device that is without access to a local persistently stored permanent cryptographic key. An application executable in the operating system of a mobile device receives a first non-permanent cryptographic key associated with the account from a remote computer system, stores the first non-permanent cryptographic key as a local cryptographic key associated with the account; generates a response cryptogram using the local cryptographic key and without accessing the permanent cryptographic key and sends a device response communication from the mobile device to an electronic reader of a POS terminal, the device response communication comprising an application data protocol unit containing the response cryptogram and an account identifier for the account.

SYSTEM AND METHOD FOR IDENTIFYING A RECIPIENT OF AN IMPLANTABLE SENSORY PROSTHESIS
20220355121 · 2022-11-10 ·

An apparatus includes a housing configured to be implanted in or on a recipient. The apparatus further includes circuitry within the housing, the circuitry including at least one storage device configured to store at least one secret. The circuitry is configured to generate, using the at least one secret, at least one code corresponding to the at least one secret and to transmit at least one stimulation signal to the recipient, the at least one stimulation signal indicative of the at least one code.

SECURITY DEVICE AND SECURITY PROGRAM
20220360438 · 2022-11-10 ·

A security device is provided. The security device includes: a communication antenna for receiving a communication signal; and a random number generator for newly generating a random number based on the communication signal received in the communication antenna.

DIGITAL CONTACT TRACING SECURITY AND PRIVACY WITH PROXIMITY-BASED ID EXCHANGE WITH A TIME-BASED DISTANCE-BOUNDING
20220360453 · 2022-11-10 ·

A method, system and devices for digital contact tracing security and privacy with proximity-based ID exchange with distance-bounding. The method is performed by a first wireless communication device and provides for exchanging IDs with a second wireless communication device. A rolling proximity identifier A associated with the first wireless communication device is sent to the second wireless communication device. A rolling proximity identifier B associated with the second wireless communication device is received from the second wireless communication device. A cryptographic challenge response authentication with time-based distance-bounding is performed based on a hash value determined from the rolling proximity identifiers in accordance with a hash function. The rolling proximity identifier of the second wireless communication device is only stored in memory in response to a successful cryptographic challenge response authentication.

SYSTEM AND METHOD FOR MITIGATING INTERNATIONAL REVENUE SHARE FRAUD

Aspects of the subject disclosure may include, for example, a non-transitory, machine-readable medium, comprising executable instructions that, when executed by a processing system including a processor, facilitate performance of operations including receiving a call; selecting a next carrier to handoff the call; generating a call data record (CDR) for the handoff to the next carrier; encrypting the CDR using a call encryption key, thereby creating an encrypted CDR; encrypting the encrypted CDR using a committee encryption key, thereby creating a double encrypted CDR; recording the double encrypted CDR to a blockchain; and sending the call encryption key to the next carrier. Other embodiments are disclosed.

ENCRYPTED GROUP COMMUNICATION METHOD
20220360573 · 2022-11-10 ·

Embodiments herein include, for example, a method, comprising: generating a shared symmetric key to begin a communication session among a group of users by a first user; distributing, by the first user, the generated shared symmetric key to each user in the group of users; communicating within the communication session among a group of users, where each user encrypts a message to the group of users to be distributed through the communication session using the generated shared symmetric key, and each user decrypts a message received from the communication session using the generated shared symmetric key.