H04W12/03

RADIO STATION SYSTEM, RADIO TERMINAL, AND METHODS THEREIN
20230239086 · 2023-07-27 · ·

A radio station (2) transmits configuration information (501) to a radio terminal (1). The configuration information (501) indicates, on a cell-by-cell basis, at least one specific cell on which the radio terminal (1) is allowed to perform at least one of data transmission and data reception on a radio bearer used for uplink transmission or downlink transmission or both via a common Packet Data Convergence Protocol (PDCP) layer (402). As a result, in a radio architecture that provides tight interworking of two different Radio Access Technologies (RATs), it is for example possible to allow an eNB to indicate, to a radio terminal (UE), a specific cell on which the UE should perform uplink transmission.

RADIO STATION SYSTEM, RADIO TERMINAL, AND METHODS THEREIN
20230239086 · 2023-07-27 · ·

A radio station (2) transmits configuration information (501) to a radio terminal (1). The configuration information (501) indicates, on a cell-by-cell basis, at least one specific cell on which the radio terminal (1) is allowed to perform at least one of data transmission and data reception on a radio bearer used for uplink transmission or downlink transmission or both via a common Packet Data Convergence Protocol (PDCP) layer (402). As a result, in a radio architecture that provides tight interworking of two different Radio Access Technologies (RATs), it is for example possible to allow an eNB to indicate, to a radio terminal (UE), a specific cell on which the UE should perform uplink transmission.

VIRTUAL TRANSPONDER UTILIZING INBAND COMMANDING
20230239278 · 2023-07-27 ·

Systems, methods, and apparatus for a virtual transponder utilizing inband commanding are disclosed. In one or more embodiments, a disclosed method comprises receiving, by a payload antenna on a vehicle via a hosted receiving antenna, encrypted hosted commands transmitted from a hosted payload (HoP) operation center (HOC). The method further comprises receiving, by the vehicle, encrypted host commands transmitted from a host spacecraft operations center (SOC). Also, the method comprises reconfiguring a payload on the vehicle according to the unencrypted host commands and/or the unencrypted hosted commands. In addition, the method comprises transmitting, by the payload antenna, payload data to a host receiving antenna and/or the hosted receiving antenna. Additionally, the method comprises transmitting, by a host telemetry transmitter, the encrypted host telemetry to the host SOC. Further, the method comprises transmitting, by a hosted telemetry transmitter, the encrypted hosted telemetry to the HOC via the host SOC.

METHOD FOR IMPROVING DATA TRANSMISSION SECURITY

A method for improving data transmission security at a user equipment comprises receiving, from a source network node, a connection release message including instructions for computing a hash value for data to be included in a connection request message; computing the hash value based on the instructions included in the connection release message; calculating a token based on the hash value, and sending, to a target network node, the connection request message including the token. The method may further forward the data from the target network node directly to a gateway after the token has been verified. The method may reduce a signaling overhead by having a fixed-size hash value for data. Furthermore, the method may improve a transmission security by including the token in an RRC message, in which the token is calculated based on the hash value representing the data.

SYSTEMS AND METHODS OF DATA TRANSFORMATION FOR DATA POOLING

A data anonymization pipeline system for managing holding and pooling data is disclosed. The data anonymization pipeline system transforms personal data at a source and then stores the transformed data in a safe environment. Furthermore, a re-identification risk assessment is performed before providing access to a user to fetch the de-identified data for secondary purposes.

SECURE COMMUNICATION OF USER DEVICE DATA

A method for facilitating secure communication between a user device and a network device. Encrypted data from a user device is received at the network device. The encrypted data is encrypted based on first physiological data captured by a first sensor of the user device. The first physiological data is representative of a physiological characteristic of a user of the user device. A second sensor of the network device captures second physiological data representative of the physiological characteristic of the user. A common key for encrypting further data transferred between the user device and the network device is determined, based on the encrypted data and the second physiological data. Further aspects relate to other methods for facilitating secure communication between a user and network device, a network, and a method of operating a network.

CONFIGURING A REMOTE ELECTRONIC DEVICE BY A PEER ELECTRONIC DEVICE IN A NETWORKED ENVIRONMENT
20230239202 · 2023-07-27 ·

A method for configuring multiple electronic devices in a batch, is described. The method can include initializing, by a first computing device a communication network based on a pre-defined configuration parameter. The pre-defined configuration parameter is associated with a first instance of an application on the first computing device. Further, the method includes identifying, by the first computing device, an initialization of a second instance of an application at a second computing device. In response to identifying the initialization of the second instance of the application at the second computing device, the method includes, sending, by the first computing device configuration settings for the second computing device over a secured communication network. In this regard, the configuration settings can comprise at least the pre-defined configuration parameter for configuring the second computing device.

METHOD FOR SECURE PAIRING BETWEEN AN ON-BOARD AND REMOTE SENSOR AND CONCENTRATOR
20230007493 · 2023-01-05 ·

A method for secure pairing between a sensor and a concentrator using a mobile terminal includes generating and emitting a confirmation code by the concentrator; converting by the sensor of the confirmation code into a sequence of light signals executed by at least one light-emitting diode; converting by the mobile terminal of the sequence of light signals into a sequence code; sending the sequence code to the concentrator; comparing, by the concentrator, the sequence code and the generated confirmation code: if the sequence code does not match the generated confirmation code, generating a warning; if the sequence code matches the generated confirmation code, pairing and exchanging information between the sensor and the concentrator.

SECURELY CONVEYING LOCATION AND OTHER INFORMATION IN ADVANCED NETWORKS
20230007470 · 2023-01-05 ·

Facilitating secure conveyance of location information and other information in advanced networks (e.g., 4G, 5G, and beyond) is provided herein. Operations of a system can comprise transforming, at a chipset level of the device, information indicative of a location of the device into a binary representation of the information indicative of the location of the device. The operations can also comprise embedding the binary representation of the information indicative of the location of the device into a message. Further, the operations can comprise facilitating a transmission of the message and the binary representation of the information indicative of the location of the device to a network device of a communications network.

SECURELY CONVEYING LOCATION AND OTHER INFORMATION IN ADVANCED NETWORKS
20230007470 · 2023-01-05 ·

Facilitating secure conveyance of location information and other information in advanced networks (e.g., 4G, 5G, and beyond) is provided herein. Operations of a system can comprise transforming, at a chipset level of the device, information indicative of a location of the device into a binary representation of the information indicative of the location of the device. The operations can also comprise embedding the binary representation of the information indicative of the location of the device into a message. Further, the operations can comprise facilitating a transmission of the message and the binary representation of the information indicative of the location of the device to a network device of a communications network.