Patent classifications
H04W12/03
METHOD, APPARATUS, AND SYSTEM FOR VEHICLE-TO-VEHICLE COMMUNICATIONS
In a method for conducting communications, a first terminal device in a vehicle-to-vehicle (V2V) network sends a first request message to a server of the V2V network to request the server to allocate an encryption key corresponding to a first service. The first request message includes an identifier of the first service and an identifier of the first terminal device. The first terminal device receives from the server a first response message that includes an encryption key corresponding to the first service. The first terminal device uses the encryption key to encrypt first information related to the first terminal device in the V2V network, and broadcasts a broadcast message that includes the encrypted first information to the V2V network.
METHOD, APPARATUS, AND SYSTEM FOR VEHICLE-TO-VEHICLE COMMUNICATIONS
In a method for conducting communications, a first terminal device in a vehicle-to-vehicle (V2V) network sends a first request message to a server of the V2V network to request the server to allocate an encryption key corresponding to a first service. The first request message includes an identifier of the first service and an identifier of the first terminal device. The first terminal device receives from the server a first response message that includes an encryption key corresponding to the first service. The first terminal device uses the encryption key to encrypt first information related to the first terminal device in the V2V network, and broadcasts a broadcast message that includes the encrypted first information to the V2V network.
BLUETOOTH COMMUNICATION METHOD AND SYSTEM
A Bluetooth communication method implemented between first and second electronic devices, including establishing a communication in a connected mode between the first and second devices including a key exchange operation between these two devices, and establishing a communication in an advertising mode between the first and second devices including a periodic broadcast by the second device to the first device of a message including a payload and a calculated tag from this key.
TECHNIQUES FOR SUPPORTING CONNECTIVITY OF REMOTE USER EQUIPMENTS WITH RELAY ACCESS VIA AN INTERWORKING FUNCTION
The present disclosure relates to wireless communications, and more particularly to providing connectivity of a PC5 remote user equipment (UE) with UE-to-network (NW) relay access to the 5G core (5GC) via an IWF (e.g., N3IWF). In one aspect, a remote UE may be provided support for a network access stratum (NAS) connection with 5GC via an IWF. In another aspect, Access Traffic Steering, Switching and Splitting (ATSSS) support may be provided for a remote UE.
Secure end-to-end transport through in intermediary nodes
A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.
Secure end-to-end transport through in intermediary nodes
A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.
Pseudonym credential configuration method and apparatus
A pseudonym credential configuration method and apparatus are provided. The method includes: receiving an identifier of a terminal device and information about N to-be-requested pseudonym credentials from the terminal device, sending N second request messages to a pseudonym credential generation server, and storing a tag of each second request message in association with the identifier of the terminal device in the registration server, so that the registration server can obtain, based on the tag, the identifier that is of the terminal device and that is associated with the tag; and generating N pseudonym credentials. The pseudonym credential generated in this application may enable a behavior investigation server to learn of a real identity of the terminal device.
Method for communicating with external electronic apparatus and electronic apparatus thereof
An electronic device and method are disclosed herein. The electronic device includes memory storing a certificate list including first certificate data of the electronic device, and second certificate data of an external electronic device, a short-range wireless communication circuit, and a processor. The processor implements the method, including: detecting a trigger event for requesting establishment a communication connection with a device local to the electronic device, controlling the short-range wireless communication circuit to broadcast an advertisement packet generated based on the first certificate data, in response to detecting the trigger event, receiving a response packet from the external electronic device and acquire a third certificate data from the received response packet, authenticating the external electronic device based on the second certificate data and the third certificate data, and establishing a secure communication channel with the external electronic device if the external electronic device is authenticated.
Method for communicating with external electronic apparatus and electronic apparatus thereof
An electronic device and method are disclosed herein. The electronic device includes memory storing a certificate list including first certificate data of the electronic device, and second certificate data of an external electronic device, a short-range wireless communication circuit, and a processor. The processor implements the method, including: detecting a trigger event for requesting establishment a communication connection with a device local to the electronic device, controlling the short-range wireless communication circuit to broadcast an advertisement packet generated based on the first certificate data, in response to detecting the trigger event, receiving a response packet from the external electronic device and acquire a third certificate data from the received response packet, authenticating the external electronic device based on the second certificate data and the third certificate data, and establishing a secure communication channel with the external electronic device if the external electronic device is authenticated.
PRIVACY INFORMATION TRANSMISSION METHOD, APPARATUS, COMPUTER DEVICE AND COMPUTER-READABLE MEDIUM
A privacy information transmission method, an apparatus, a computer device and a computer-readable medium are disclosed. The method may include: generating authentication information in response to receiving of an identity registration request message sent by a terminal device via a base station, and encrypting the authentication information with a first private key to generate encrypted authentication information; sending a first identity identification request message carrying the encrypted authentication information to the terminal device; and receiving an identity identification response message returned by the terminal device, and acquiring privacy information from the identity identification response message.