H04W4/70

Provisioning platform for machine-to-machine devices

Techniques described herein include a platform and process for provisioning user information onto a machine-to-machine device in order to enable the machine-to-machine device to conduct transactions utilizing the user information. In some embodiments, a user device is used to relay information between a machine-to-machine device and a provisioning service provider computer. In some embodiments, a machine-to-machine device is connected to the provisioning service provider computer via a network connection. Upon receiving a request to provision the machine-to-machine device, the service provider computer may identify the device from a device identifier. The service provider computer may generate an access credential or token for the machine-to-machine device. The access credential, token, and/or one or more policies may be provisioned onto the machine-to-machine device.

Provisioning platform for machine-to-machine devices

Techniques described herein include a platform and process for provisioning user information onto a machine-to-machine device in order to enable the machine-to-machine device to conduct transactions utilizing the user information. In some embodiments, a user device is used to relay information between a machine-to-machine device and a provisioning service provider computer. In some embodiments, a machine-to-machine device is connected to the provisioning service provider computer via a network connection. Upon receiving a request to provision the machine-to-machine device, the service provider computer may identify the device from a device identifier. The service provider computer may generate an access credential or token for the machine-to-machine device. The access credential, token, and/or one or more policies may be provisioned onto the machine-to-machine device.

Integration of radio and core layers

A method, a device, and a non-transitory storage medium are described in which a radio and core integrated layers service is provided. The service provides a direct mapping of a quality of service flow between a packet data unit layer and a service data adaptation layer associated with a user plane function and a central unit-user plane function without an intermediary mapping of a tunneling protocol in the user plane.

Secure authentication of devices for Internet of Things

A computer-implemented system and method for secure authentication of IoT devices are disclosed. The method for secure authentication of IoT devices comprises establishing a network connection with a network operator server via a control channel, establishing identity of the network operator server using a pre-shared server key from one or more of pre-shared server keys, establishing identity of the IoT device using a pre-shared client key from one or more of pre-shared client keys and cryptographically generating a session key for a network session to allow secure data exchange between the network operator server and the IoT device. The cryptographically generated session key is used for securely authenticating application running on the authenticated IoT device.

Secure streaming of real-time location data between electronic devices

Embodiments described herein provide for system and methods to enable the secure streaming of real-time location data between electronic devices. One embodiment provides for a non-transitory machine-readable medium storing instructions to perform operations comprising creating record to specify a location streaming relationship between a first device registered with a first user account and a second device registered with a second online account, the record including a secret key. The record is stored to an online datastore and shared between the first user account and the second online account. The location data stream can be encrypted using the secret key stored in the record.

Secure streaming of real-time location data between electronic devices

Embodiments described herein provide for system and methods to enable the secure streaming of real-time location data between electronic devices. One embodiment provides for a non-transitory machine-readable medium storing instructions to perform operations comprising creating record to specify a location streaming relationship between a first device registered with a first user account and a second device registered with a second online account, the record including a secret key. The record is stored to an online datastore and shared between the first user account and the second online account. The location data stream can be encrypted using the secret key stored in the record.

Identification of a poorly parked vehicle and performance of a first group of actions to cause one or more other devices to perform a second group of actions

A device can receive parking metadata that includes location data indicating that a portion of a vehicle is located outside of a designated parking area (DPA). The device can process the parking metadata to identify values that are to be used when determining actions to perform. The device can obtain supplemental events data associated with events occurring near the DPA. The device can determine the actions to perform based on the parking metadata and the supplemental events data. The device can provide, as one of the actions and to one or more other devices or to the vehicle, a message indicating that the portion of the vehicle is located outside of the DPA. This can cause the one or more other devices or the vehicle to: move the vehicle from the DPA, reposition the vehicle within the DPA, or penalize an owner of the vehicle.

Transient infrastructure for ubiquitous network communications applications
11580348 · 2023-02-14 ·

The disclosure generally relates to networking infrastructure and, more particularly, to installing transient infrastructure for ubiquitous networking applications. A wireless gateway device is sent to physical premises with a parcel. After the wireless gateway device is delivered to the physical premises, a processor of the wireless gateway device draws power from the energy source to perform operations comprising executing program code stored in non-transitory processor-readable medium to establish a wireless communications connection with a network service through a first type of wireless communications interface. The wireless gateway device performs operations comprising establishing wireless communications with one or more wireless peripheral devices in the physical premises through the second type of wireless communications interface.

Selection method for optimising communications by ambient backscattering, and associated system
20230044921 · 2023-02-09 ·

A method for selection by an ambient backscatter system including a source as well as transmitting and receiving devices, the source being associated with a precoder for focusing signals towards the devices. Furthermore, the method includes, for a plurality of values ϕ_1, . . . , ϕ_N: a phase-shift, by the source, of one of the components of the precoder according to the value ϕ_i, so as to obtain a precoder Q_i; an emission, by the source, using the precoder Q_i; an acquisition, by the receiving device, of power measurements during non-backscattering and backscattering states, a determination, by the receiving device, of a value D1_i representative of a power deviation between the measurements. The method also includes a selection, by the receiving device, of a maximum value among the values D1_1, . . . , D1_N.

Apparatus and Methods for Encrypted Communication
20230045486 · 2023-02-09 ·

A communication system including a first device (1a, 1a′) and a second device (1b, 1b′). The first device (1a, 1a′) comprises a memory storing first-device-specific identification data and the second device (1b, 1b′) comprises a memory storing second-device-specific identification data. The first device (1a, 1a′) is configured to receive a copy of the second-device-specific identification data and to store the copy in the memory of the first device (1a, 1a′) and the second device (1b, 1b′) is configured to receive a copy of the first-device-specific identification data and to store the copy in the memory of the second device (1b, 1b′). The first device (1a, 1a′) is configured to derive a first encryption key from the first-device-specific identification data and the received copy of the second-device-specific identification data. The second device is configured to derive the first encryption key from the second-device-specific identification data and the received copy of the first-device-specific identification data. The first device (1a, 1a′) encrypts transmission data using the first encryption key and transmits the encrypted transmission data to the second device (1b, 1b′). The second device (1b, 1b′) receives the encrypted transmission data from the first device (1a, 1a′) and decrypts the encrypted transmission data using the first encryption key.