Patent classifications
H04W12/03
Integrated secure device manager systems and methods for cyber-physical vehicles
Systems and methods are described for a cyber-physical vehicle management system generated by an Integrated Secure Device Manager (ISDM) Authority configured to manage licensing and approval of Cyber-Physical Vehicle (CPV)s, a public/private key pair and a unique ID for the Authority, create a self-signed Authority token signed by the private key, send the Authority token to a plurality of ISDM Node device configured to verify Module device authenticity and in communication with the Authority, store, by each Node, the Authority token, and mark, by each Node, the Authority token as trusted.
Transmission of group handover message
Methods, apparatuses, and computer readable medium for enabling an efficient group handover mechanism that has less signaling overhead than single UE handover are provided. An example method at a base station includes transmitting a group handover request for the group of UEs to a target base station. The method further includes receiving a group handover acknowledgment from the target base station. The method further includes transmitting a group handover message to the group of UEs.
Transmission of group handover message
Methods, apparatuses, and computer readable medium for enabling an efficient group handover mechanism that has less signaling overhead than single UE handover are provided. An example method at a base station includes transmitting a group handover request for the group of UEs to a target base station. The method further includes receiving a group handover acknowledgment from the target base station. The method further includes transmitting a group handover message to the group of UEs.
Virtual private network connection status detection
Virtual private network (VPN) service provider infrastructure (SPI) receives a request to access a VPN from a client device. The VPN SPI selects an Internet Protocol (IP) address for access to the VPN by the client device from a pool of IP addresses. The VPN SPI provides access to the VPN for the client device via the IP address. The VPN SPI receives one or more handshake notifications from the client device. The VPN SPI determines that a threshold time period has passed since a latest-in-time handshake notification of the one or more handshake notifications. The VPN SPI disconnects the client device from the VPN in response to determining that the threshold time period has passed. The VPN SPI adds the IP address to the pool of IP addresses in response to disconnecting the client device from the VPN.
Systems and methods for imaging communication and control
A telesurgical mentoring platform with a wheeled base, a lower rack mounted on the base, an upper rack extending vertically from the lower rack, a compactly foldable articulated arm that is configured to extend horizontally outward away from the upper rack and configured to connect to a connector piece holding an end effectuator at its distal end, a tablet personal computer; the console configured to be readily mobilized on the floor of an existing operating room and is capable of providing a connectivity point for communication, audiovisual, and data transfer services in an operating room.
Apparatus and method for network security
The present disclosure relates to a 5th generation (5G) or pre-5G communication system for supporting a higher data transfer rate beyond a 4th generation (4G) communication system, such as long-term evolution (LTE). According to various embodiments of the present disclosure, a security method of a mobility management apparatus of a second system in a wireless environment may comprise the steps of: receiving a handover request for a terminal connected to a first system; transmitting the handover request to a base station of the second system; and receiving a handover ACK including security information generated by the base station of the second system and transmitting the same to the first system.
Encryption circuit randomness inspector and method
A baseband processor of a communication device, the baseband processor comprising a multiple encryption manager that utilizes a transmit data stream as an input data stream in the case that the transmit data stream is determined not to already have encryption applied by a higher layer component, and that utilizes a known unencrypted dataset as an input data stream in the case that the transmit data stream is determined to already have encryption applied by a higher layer component, an encryptor block that encrypts the input data stream into an encrypted data stream, and a randomness inspector that is in communication with the encryptor block, the randomness inspector unit accessing the input data stream and the encrypted data stream from the encryptor block and determining a randomness gain by comparing a first randomness measurement associated with the input data stream to a second randomness measurement associated with the encrypted data stream.
Encryption circuit randomness inspector and method
A baseband processor of a communication device, the baseband processor comprising a multiple encryption manager that utilizes a transmit data stream as an input data stream in the case that the transmit data stream is determined not to already have encryption applied by a higher layer component, and that utilizes a known unencrypted dataset as an input data stream in the case that the transmit data stream is determined to already have encryption applied by a higher layer component, an encryptor block that encrypts the input data stream into an encrypted data stream, and a randomness inspector that is in communication with the encryptor block, the randomness inspector unit accessing the input data stream and the encrypted data stream from the encryptor block and determining a randomness gain by comparing a first randomness measurement associated with the input data stream to a second randomness measurement associated with the encrypted data stream.
METHOD AND APPARATUS FOR DISPLAYING WIFI SIGNAL ICON, AND MOBILE TERMINAL
The present disclosure relates to a method for displaying a WiFi signal icon on a mobile terminal. The method includes determining a security level of a current WiFi network, marking a WiFi signal icon according to a color corresponding to the security level, and displaying the marked WiFi signal icon on the mobile terminal.
Security for Wireless Broadcasts
Methods and systems are provided for concealing identifying data that may be used to identify a beacon or device in broadcasts unless an observer device is able to directly or indirectly, via an authorized resolver device, translate an encrypted broadcast into the identifiable information. The wireless security scheme disclosed herein also pertains to resolving the concealed data messages to obtain the identifiable information.