H04W12/02

ELECTRONIC DEVICE AND METHOD FOR PROCESSING USER INTERACTION INFORMATION

A method for processing user interaction information by an electronic device, includes: executing an application in an unsecure area of the electronic device; instantiating an object of the application; recognizing a user interface of the application, converting a user reaction between a pseudo-event and the instantiated object into data, and transmitting the data to a secure area of the electronic device; mirroring the application to the secure area by using the data; based on a user input being detected, inferring an event to be recognized by a graphical user interface (GUI) framework of the electronic device; and interpreting, in the secure area, the user reaction to the instantiated object corresponding to the inferred event

Network identifier and authentication information generation for building automation system controllers

Generating network identifier information and authentication information for wireless communication with a controller includes accessing, by the controller, identity information associated with the controller. The controller obfuscates the identity information and generates the network identifier information and the authentication information associated with the controller using the obfuscated identity information. The controller is configured for wireless communication using the generated network identifier information and the generated authentication information.

Access control system with virtual card data
11694498 · 2023-07-04 · ·

An access control system includes a mobile library on a mobile device operable to communicate with the credential service, the mobile library operable to receive the credential from the credential service and a credential module for an access control, the credential module operable to receive virtual card data from the credential, the virtual card data usable to operate the access control.

Access control system with virtual card data
11694498 · 2023-07-04 · ·

An access control system includes a mobile library on a mobile device operable to communicate with the credential service, the mobile library operable to receive the credential from the credential service and a credential module for an access control, the credential module operable to receive virtual card data from the credential, the virtual card data usable to operate the access control.

Security for paging messages

Briefly, in accordance with one or more embodiments, an apparatus of a user equipment (UE), comprises one or more baseband processors to derive a dynamic scrambling key, and a memory to store the dynamic scrambling key and a temporary UE identifier (temporary UE ID) assigned to the UE. The one or more baseband processors monitor a paging request for a scrambled UE identifier (UE ID) to determine if the paging request is intended for the UE by unscrambling the scrambled UE ID with the dynamic scrambling key to produce the temporary UE ID. The paging request is intended for the UE if the temporary UE ID produced by unscrambling the scrambled UE ID matches the temporary UE ID stored in the memory. A new dynamic scrambling key may be derived each time the UE returns to a radio resource control idle (RRC_IDLE) state.

Security for paging messages

Briefly, in accordance with one or more embodiments, an apparatus of a user equipment (UE), comprises one or more baseband processors to derive a dynamic scrambling key, and a memory to store the dynamic scrambling key and a temporary UE identifier (temporary UE ID) assigned to the UE. The one or more baseband processors monitor a paging request for a scrambled UE identifier (UE ID) to determine if the paging request is intended for the UE by unscrambling the scrambled UE ID with the dynamic scrambling key to produce the temporary UE ID. The paging request is intended for the UE if the temporary UE ID produced by unscrambling the scrambled UE ID matches the temporary UE ID stored in the memory. A new dynamic scrambling key may be derived each time the UE returns to a radio resource control idle (RRC_IDLE) state.

Managing permissions for different wireless devices to control a common host device

Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.

Managing permissions for different wireless devices to control a common host device

Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.

Systems and methods for uplink high efficiency location in a wireless network
11696122 · 2023-07-04 · ·

Uplink high efficiency location of a user equipment (UE) includes initiating periodic or triggered location in the UE by a location server (LS) in a wireless network. The UE enters an idle state and monitors for triggering events. After detecting an event, the UE transmits an uplink positioning signal (UPS) to a base station, where the UPS encodes UPS data comprising a UE ID, an ID for the LS, an authentication code (AC) and location measurements. UPS transmission occurs in an uplink positioning occasion shared with other UEs. The location measurements may be ciphered but other UPS data is unciphered. The base station obtains additional location measurements and transfers the UPS data and the location measurements to the LS. The LS authenticates the UE ID using the AC, determines the UE location using the location measurements and transfers the location to an external client.

Systems and methods for uplink high efficiency location in a wireless network
11696122 · 2023-07-04 · ·

Uplink high efficiency location of a user equipment (UE) includes initiating periodic or triggered location in the UE by a location server (LS) in a wireless network. The UE enters an idle state and monitors for triggering events. After detecting an event, the UE transmits an uplink positioning signal (UPS) to a base station, where the UPS encodes UPS data comprising a UE ID, an ID for the LS, an authentication code (AC) and location measurements. UPS transmission occurs in an uplink positioning occasion shared with other UEs. The location measurements may be ciphered but other UPS data is unciphered. The base station obtains additional location measurements and transfers the UPS data and the location measurements to the LS. The LS authenticates the UE ID using the AC, determines the UE location using the location measurements and transfers the location to an external client.