H04L2209/80

SYSTEM AND METHOD FOR A TRUSTED DIGITAL IDENTITY PLATFORM
20230020703 · 2023-01-19 · ·

A system and method is disclosed for a digital identity (DI) management platform. A carbon identification may be generated to include personal information unique to a user. The personal information may be authenticated by an external entity (e.g., governmental agency) to the digital identity management platform. A silicon identification may be generated for multiple devices registered to the user and may include a unique identifier for each device. A digital identity may be generated that links the carbon identification and the silicon identification The digital identity may be stored within a digital wallet accessible on each device by a user profile created and secured using a blockchain process. A request to access the personal information stored within the digital identity may be received and a predefined trust level will determine the amount of personal information to be provided.

SYSTEM AND METHOD FOR TRUE PEER-TO-PEER AUTOMATIC TELLER MACHINE TRANSACTIONS USING MOBILE DEVICE PAYMENT SYSTEMS
20230013074 · 2023-01-19 ·

A system and method for true peer-to-peer automatic teller machine transactions using mobile device payment systems, where a user may receive physical cash in exchange for digital currency from another user, without either one of them having to have a merchant account or a credit/debit card clearing system through a payment processor, comprising a smartphone with an associate peer-to-peer ATM application, blockchain datastore, GPS satellite, cellular tower, and smart wallet application.

QUANTUM RESISTANT SECURE KEY DISTRIBUTION IN VARIOUS PROTOCOLS AND TECHNOLOGIES
20230014894 · 2023-01-19 ·

A quantum resistant method is provided for supporting user equipment (UE) roaming across APs/eNBs/gNBs belonging to various Wireless LAN Controllers (WLCs) in enterprise 5G and WiFi co-located deployments. The method may include initializing a SKS server in an electrical communication with a master WLC with a random post-quantum common secret seed (PQSEED) to generate a post-quantum pre-shared key (PQPSK) and a respective PQPSK-ID. The method may also include sending an encrypted PQSEED along with a PQPSK-ID to a second WLC. The method may further include joining AP (WiFi) to the master WLC using a CAPWAP/DTLS protocol. The method may further include sending the PQPSK-ID from the master WLC to the UE in an EAP success packet when the UE is associated with the AP (WiFi).

GLOBAL RESOURCE LOCATOR LABEL
20230221403 · 2023-07-13 ·

The present disclosure relates to a global resource locator tag and methods of using the same. A semiconductor chip can include a processor and a micro sized timing device. The semiconductor chip can generate a timing signal. The global resource locator tag can include a blockchain and a memory in logical communication with the processor. The processor can determine a cryptographic hash of a previous block of events in the blockchain. The processor can determine an respective inventory status of nearby labels. The processor can compile a data set with the respective inventory status of each of the nearby labels and the cryptographic hash of the previous block. The processor can record a next event of the events in a next block of the blockchain. The next event can include the data set.

MODULATION-AGNOSTIC TRANSFORMATIONS USING UNITARY BRAID DIVISIONAL MULTIPLEXING (UBDM)
20230224143 · 2023-07-13 · ·

A method for implementing a fast UBDM transform includes receiving a first, input vector via a processor, and partitioning the first vector to produce a magnitude vector and a sign vector. A second vector, including a modified magnitude vector and a modified sign vector, is generated by: applying a permutation to the magnitude vector to produce the modified magnitude vector, converting the sign vector, based on an algorithm, into an intermediate sign vector, and applying nonlinear layers to the intermediate sign vector. Each nonlinear layer includes a permutation, an S-box transformation, a diffusive linear operation and/or an Xor operation. Multiple linear layers are applied to the second vector to produce a third vector, the third vector being a transformed version of the first vector. A first signal representing the third vector is sent to at least one transmitter for transmission of a second signal representing the transformed data vector.

Key distribution method, key receiving method, first key management system, and first network element
11700245 · 2023-07-11 · ·

The present invention disclose a key distribution method. The method includes obtaining, by a first key management system, a shared key of a first network element, where the shared key of the first network element is generated according to a key parameter obtained after the first network element performs authentication or a root key of the first network element; obtaining a service key, where the service key is used to perform encryption and/or integrity protection on communication data in a first service between the first network element and a second network element; performing encryption and/or integrity protection on the service key by using the shared key of the first network element, to generate a first security protection parameter; and sending the first security protection parameter to the first network element. According to present invention, data can be protected against an eavesdropping attack in a sending process.

Authentication mechanism for 5G technologies

Embodiments of this disclosure provide techniques for securely communicating an IMSI over the air from a UE to an SeAN, as well as for securely validating an unencrypted IMSI that the SeAN receives from the home network, during authentication protocols. In particular, the UE may either encrypt the IMSI assigned to the UE using an IMSI encryption key (K.sub.IMSIenc) or compute a hash of the IMSI assigned to the UE using an IMSI integrity key (K.sub.IMSIint), and then send the encrypted IMSI or the hash of the IMSI to the serving network. The encrypted IMSI or hash of the encrypted IMSI may then be used by the SeAN to validate an unencrypted IMSI that was previously received from an HSS in the home network of the UE.

Methods and arrangements for vehicle-to-vehicle communications

Logic may implement protocols and procedures for vehicle-to-vehicle communications for platooning. Logic may implement a communications topology to distinguish time-critical communications from non-time-critical communications. Logic may sign time-critical communications with a message authentication code (MAC) algorithm with a hash function such as Keccak MAC or a Cipher-based MAC. Logic may generate a MAC based on pairwise, symmetric keys to sign the time-critical communications. Logic may sign non-time-critical communications with a digital signature. Logic may encrypt non-time-critical communications. Logic may append a certificate to non-time-critical communications. Logic may append a header to messages to create data packets and may include a packet type to identify time-critical communications. Logic may decode and verify the time-critical messages with a pairwise symmetric key. And logic may prioritize time-critical communications to meet a specified latency.

Radio frequency threat detection

A system and method includes receiving, via a fiber optic cable, an analog fiber optic signal that preserves native radio frequency (RF) energy characteristics of at least one first RF signal associated with at least one wireless device, and converting, by a light-to-RF converter, the received analog fiber optic signal into at least one second RF signal. The system and method can further comprise analyzing, by a processor, the at least one second RF signal and generating, by the processor, at least one digital signature associated with the at least one wireless device, respectively, based on the analysis of the at least one second RF signal. The system and method yet further comprise determining, by the processor, if the at least one wireless device associated with the at least one digital signature, respectively, is one of an authorized device and an unauthorized device.

Determining an Environmental Parameter From Sensor Data of a Plurality of Automobiles Using a Cellular Network
20230217252 · 2023-07-06 · ·

A computer server receives sensor data via a cellular wireless network from each of a plurality of automobiles in a geographical area. In each automobile of the plurality of automobiles the sensor data is received from sensors located in the respective automobile. The sensor data of the respective automobile may include a time stamp of the sensor data and at least one parameter of an external environment of the respective automobile. The computer server may further determine an external environmental parameter of the geographical area based on the sensor data received from the plurality of automobiles in the geographical area via the cellular wireless network. The external environmental parameter relates to the external environment of the plurality of automobiles in the geographical area. The computer server may transmit the external environmental parameter to multiple automobiles of the plurality of automobiles.