Patent classifications
H04W12/009
METHOD TO AUTHENTICATE WITH A MOBILE COMMUNICATION NETWORK
Apparatuses, methods, and systems are disclosed for authenticating with a mobile communication network. One apparatus includes a memory comprising instructions executable by a processor to cause the apparatus to receive, from a remote unit, a first request to start authentication via a non-3GPP access network and to send, to the remote unit, an EAP-Start packet to initiate an EAP-5G session between the apparatus and the remote unit for exchanging NAS messages between the remote unit and an AMF via the apparatus. Here, the EAP-5G session utilizes EAP-5G packets having an expanded EAP type and a 3GPP vendor ID, the NAS messages being encapsulated within the EAP-5G packets. The apparatus further receives, from the remote unit, an EAP-5G response packet including a NAS request message and a first set of AN-Params including a PLMN ID of the mobile communication network and NSSAI.
Key Negotiation Method and Electronic Device
A key negotiation method and an electronic device are provided, and relate to the field of communications technologies. Specifically, the method includes: An IoT control device multicasts, in a first local area network, a discovery message that carries a first public key, and sends a second ciphertext to a first IoT device after receiving a first ciphertext and a second public key. After receiving a third ciphertext from the first IoT device, the IoT control device decrypts the third ciphertext based on a first session key, to obtain a second signature and second session information; verifies the second signature based on a long-term public key of the first IoT device; and performs encrypted communication with the first IoT device based on the first session key after the second signature is successfully verified.
METHOD AND SYSTEM FOR MANAGING DATA EXCHANGE IN THE CONTEXT OF A MEDICAL EXAMINATION
The invention relates to a method for managing exchanges of data between: —a probe (1) comprising a memory containing a probe digital certificate including a probe public key, —a terminal (2) comprising a memory containing a terminal digital certificate including a terminal public key, —a remote platform (3) configured to: .sup.∘deliver the probe digital certificate to the probe and .sup.∘deliver the terminal digital certificate to the terminal, characterised in that the method comprises the implementation of an authentication procedure consisting of the following steps:—a first step in which the probe verifies the identity of the terminal from the terminal digital certificate; —a second step in which the terminal verifies the identity of the probe from the probe digital certificate, and—a third step in which the probe, the terminal and the platform each generate an identical session key from the probe and terminal public keys.
Apparatus and locale-based method for thwarting deceptions and/or denial of services
Technical problems and their solution are disclosed regarding the location of mobile devices requesting services near a site from a server. Embodiments adapt and/or configure the transmitting device near the site, the mobile device communicating with the transmitting device using a short haul wireless communications protocol to deliver a token based upon a key shared with the server but invisible to the mobile device. The server can determine the proximity of the mobile device to the site to control actuation of the requested service or disable the service request, and possibly flushing the service request from the server. Solutions are disclosed for traffic intersections involving one or more traffic lights, elevators in buildings, fire alarms in buildings and valet parking facilities.
Methods, systems, and media for protected near-field communications
Methods, systems, and media for protected near-field communications are provided. In some embodiments, the method comprises: receiving, from an NFC tag device, a request for an NFC reader device identifier (ID); transmitting the NFC reader device ID to the NFC tag device; receiving an NFC tag device ID; determining whether the NFC tag device ID matches an NFC tag device ID stored in memory of the NFC reader device; in response to determining that the NFC tag device ID matches the NFC tag device ID, transmitting a password to the NFC tag device; receiving, from the NFC tag device, a shared secret; determining whether the received shared secret matches a shared secret stored in the memory of the NFC reader device; and in response to determining that the received shared secret matches the shared secret, causing an action to be performed by a device associated with the NFC reader device.
ACCESSING CORPORATE RESOURCES THROUGH AN ENROLLED USER DEVICE
Systems and methods are described for accessing resources of a Unified Endpoint Management (“UEM”) system through an enrolled device. In an example, an unenrolled device can be paired with an enrolled device. The unenrolled device can connect to the enrolled device on a local network. The enrolled device can verify the unenrolled device using a key provided during pairing. The unenrolled device can send requests for UEM resources to the enrolled device, which the enrolled device can send to a UEM server. The UEM server can send the requested UEM resources to the enrolled device, and the enrolled device can send the UEM resources to the enrolled device over the local network.
SYSTEMS AND METHODS FOR REDUCING GRAIN THEFT IN HARVESTING OPERATIONS
Systems and methods for theft reduction of grain are disclosed. A grain cart includes a theft detection system that monitors grain onboarded into the grain cart from a harvesting machine, and grain offloaded from the grain cart to a trailer. The theft detection system measures a weight value of the grain received from the harvesting machine, and transmits the weight value to a tracking system. Additionally, the theft detection system can receive an expected grain weight value from the harvesting machine and compare the measured weight value with the received weight value, and provide a notification (e.g., alarm) of the difference is greater than a predetermined threshold. The theft detection system can provide similar functions between weight values of grain in the grain cart and a trailer. Also, the theft detection system can encrypt transmit the weight values prior to transmitting to the tracking system.
SECURITY SOLUTION FOR SWITCHING ON AND OFF SECURITY FOR UP DATA BETWEEN UE AND RAN IN 5G
A network node configured to perform a process that includes receiving a PDU Session Establishment Request message for establishing a PDU session, wherein the PDU Session Establishment Request message was transmitted by a UE and includes a PDU session ID. The process also includes communicating a Session Management (SM) Request comprising the PDU Session Establishment Request to an SMF. The process also includes receiving from the SMF a message that includes: i) the PDU Session ID identifying the PDU session, ii) a PDU Session Establishment Accept message, and iii) a user plane (UP) security policy for the PDU session, wherein the UP security policy for the PDU session indicates: i) whether UP confidentiality protection shall be activated or not for all data radio bearers (DRBs) belonging to the PDU session, and/or ii) whether UP integrity protection shall be activated or not for all data radio bearers (DRBs) belonging to the PDU session.
Brokered communication protocol using information theoretic coding for security
A communication brokering device receives, from a first device, a measurement of at least one of a bit-error-rate (BER) or a signal-to-noise ratio (SNR) associated with receipt of a transmission at the first device. The communication brokering device determines whether the first device is vulnerable to message interception or eavesdropping based on the measurement of the at least one of the BER or the SNR. The communication brokering device controls communications between at least one second device and the first device based on the determination of whether the first device is vulnerable to message interception or eavesdropping.
METHOD AND SYSTEM FOR DATA TRANSMISSION, CHIP, ELECTRONIC DEVICE, AND COMPUTER READABLE STORAGE MEDIUM
The present disclosure provides a method and system for data transmission, chip, an electronic device, and a computer readable storage medium. The method applied at a first Bluetooth end includes: establishing a point-to-point connection with a second Bluetooth end; acquiring identity information of the second Bluetooth end through the point-to-point connection; and sending broadcast isochronous group information BIGInfo to the second Bluetooth end through the point-to-point connection when the identity information of the second Bluetooth end is verified, to enable the second Bluetooth end to receive a data stream of a broadcast isochronous group BIG sent by the first Bluetooth end according to the BIGInfo.