Patent classifications
H04W12/03
METHOD AND SYSTEM FOR MANAGING DATA EXCHANGE IN THE CONTEXT OF A MEDICAL EXAMINATION
The invention relates to a method for managing exchanges of data between: —a probe (1) comprising a memory containing a probe digital certificate including a probe public key, —a terminal (2) comprising a memory containing a terminal digital certificate including a terminal public key, —a remote platform (3) configured to: .sup.∘deliver the probe digital certificate to the probe and .sup.∘deliver the terminal digital certificate to the terminal, characterised in that the method comprises the implementation of an authentication procedure consisting of the following steps:—a first step in which the probe verifies the identity of the terminal from the terminal digital certificate; —a second step in which the terminal verifies the identity of the probe from the probe digital certificate, and—a third step in which the probe, the terminal and the platform each generate an identical session key from the probe and terminal public keys.
Data sharding for transmission over a high generation cellular network
Aspects of the disclosure relate to data sharding for transmission over a high generation cellular network. A computing platform may detect, via a communication network, transmission of data from a first computing device to a second computing device. Subsequently, the computing platform may intercept, prior to receipt of the transmission by the second computing device, the data. Then, the computing platform may shard the data into a first shard and a second shard. Then, the computing platform may identify, within the communication network, a first communication channel and a second communication channel. Then, the computing platform may send, to the second computing device, the first shard via the first communication channel, and the second shard via the second communication channel. Subsequently, the computing platform may merge, the first shard and the second shard, to reconfigure the data.
Subscriber identification module (SIM) authentication protections
A method of computer authentication of a user request for a Subscriber Identity Module (SIM) card transfer by a biometric signature from a user equipment (UE) comprising assigning a risk score, by a mobile service provider, to a user account based on user activity in the user account, wherein the user activity includes a SIM card transfer authorization. The mobile service provider then sends a message requesting a biometric signature from an authentication application executing in memory on the UE. The authentication application on the UE then proceeds capturing a biometric signature, encrypting the biometric signature, and sending an encrypted biometric signature to the mobile service provider using a wireless communication protocol. The mobile service provider then compares the biometric signature to an authorized signature and modifies the risk score based on the comparison.
Subscriber identification module (SIM) authentication protections
A method of computer authentication of a user request for a Subscriber Identity Module (SIM) card transfer by a biometric signature from a user equipment (UE) comprising assigning a risk score, by a mobile service provider, to a user account based on user activity in the user account, wherein the user activity includes a SIM card transfer authorization. The mobile service provider then sends a message requesting a biometric signature from an authentication application executing in memory on the UE. The authentication application on the UE then proceeds capturing a biometric signature, encrypting the biometric signature, and sending an encrypted biometric signature to the mobile service provider using a wireless communication protocol. The mobile service provider then compares the biometric signature to an authorized signature and modifies the risk score based on the comparison.
Methods, systems, and media for protected near-field communications
Methods, systems, and media for protected near-field communications are provided. In some embodiments, the method comprises: receiving, from an NFC tag device, a request for an NFC reader device identifier (ID); transmitting the NFC reader device ID to the NFC tag device; receiving an NFC tag device ID; determining whether the NFC tag device ID matches an NFC tag device ID stored in memory of the NFC reader device; in response to determining that the NFC tag device ID matches the NFC tag device ID, transmitting a password to the NFC tag device; receiving, from the NFC tag device, a shared secret; determining whether the received shared secret matches a shared secret stored in the memory of the NFC reader device; and in response to determining that the received shared secret matches the shared secret, causing an action to be performed by a device associated with the NFC reader device.
Software updates based on transport-related actions
An example operation includes one or more of receiving, by a transport, over an open wireless network an encrypted software update and receiving, by the transport, over a closed wireless network a one-time key to decrypt the encrypted software update, wherein the one-time key is received while the transport is in motion and about to perform an action related to the software update.
DEVICE AND METHOD FOR GENERATING SCRAMBLED TIMESTAMP SEQUENCE (STS) IN ULTRA WIDE BAND (UWB) COMMUNICATION SYSTEM
Provided is a method of an electronic device for performing ultra wide band (UWB) communication. The method includes receiving upper bit information including pre-set at least one parameter via a UWB command interface (UCI), obtaining slot count information and key information including a constant key value, and performing static scrambled timestamp sequence (STS) generation, based on the upper bit information, the slot count information, and the key information.
DEVICE AND METHOD FOR GENERATING SCRAMBLED TIMESTAMP SEQUENCE (STS) IN ULTRA WIDE BAND (UWB) COMMUNICATION SYSTEM
Provided is a method of an electronic device for performing ultra wide band (UWB) communication. The method includes receiving upper bit information including pre-set at least one parameter via a UWB command interface (UCI), obtaining slot count information and key information including a constant key value, and performing static scrambled timestamp sequence (STS) generation, based on the upper bit information, the slot count information, and the key information.
METHODS, APPARATUS AND SYSTEMS FOR ADDRESS CONFIGURATION FOR INTEGRATED ACCESS AND BACKHAUL LINKS
Methods, apparatus and systems for address configuration for integrated access and backhaul (IAB) links are disclosed. In one embodiment, a method performed by a first network node is disclosed. The method comprises: obtaining, from an operations administration and maintenance (OAM) or a second network node, a first address information related to at least one Internet Protocol security (IPsec) address; generating, based on the first address information, a second address information; and transmitting, to the second network node, the second address information based on a radio resource control (RRC) message, wherein the first network node and the second network node are connected via a backhaul link in an integrated access and backhaul (IAB) network.
AUTHENTICATION METHOD BETWEEN TERMINALS HAVING PROXIMITY COMMUNICATION FUNCTION AND TERMINALS IMPLEMENTING THE SAME METHOD
An authentication method in a secure channel unused mode on a first terminal in which Fine Ranging (FiRa) applet drives according to an embodiment of the present disclosure includes generating a session basic information including a random value, transmitting the generated session basic information to a second terminal, generating session data including a session key from the generated session basic information using an authentication key pre-shared with the second terminal, and performing ultra-wide band (UWB) ranging with the second terminal using the generated session data.