H04W12/04

Information Sharing System, Computer, and Information Sharing Method
20180006810 · 2018-01-04 ·

It is provided an information sharing system, comprising a server, and an in-vehicle system. The server includes: a first storage part; a first key generation part configured to generate a first private key and a first public key, if keys can be exchanged with the in-vehicle system; and a signature generation part configured to generate a signature value of the first public key using a server private key. The in-vehicle system includes: a second storage part configured to store a public key certificate including a server public key; a signature verification part configured to verify the first public key and a signature value received from the server, using a public key certificate; and a second key generation part configured to generate a second private key and a second public key, if a combination of the first public key and the signature value is correct as a result of the verification.

CORE NETWORK CONNECTIONLESS SMALL DATA TRANSFER
20180007557 · 2018-01-04 ·

Connectionless data transfer is disclosed. Authentication of a device and network node may be performed when data is sent from the device to an application server of an application service provider via a selected network. The transfer of data may take place in an absence of an existing device context between the network node interacting with the device and the core network through which the data travels. State management overhead and signaling overhead may be reduced by use of the exemplary aspects disclosed herein. For example, the device does not need to perform an authentication and key agreement (AKA) procedure to transfer the data and an existing (or pre-existing) device context need not be maintained at the core network.

ACCESS DATA PROVISIONING APPARATUS AND METHODS
20180014184 · 2018-01-11 ·

Methods and apparatus for activating a purchased or previously deployed device by a subscriber. In one embodiment, activation includes authenticating the device to a service provider or carrier, and providing the device with data necessary for enabling the service to the device. In one variant, a user device is activated at a retail store, with the assistance of a carrier representative. In another variant, user equipment is activated via a communications network without the assistance of a representative. In yet another variant, the user equipment is activated via the Internet without the assistance of a representative. The provision of access data includes pre-assigning eSIM from a population of unassigned eSIMs to certain devices for various carrier networks. Alternatively, the eSIM may be assigned on an as-needed basis. Unassigned and/or unused eSIMs can be released (or sold back to the vendor) and/or reused. Solutions for eSIM backup and restoration are also described.

DISTRIBUTED COLLABORATIVE SIGNALING IN FULL DUPLEX WIRELESS TRANSCEIVERS
20180014203 · 2018-01-11 ·

Two-way (full-duplex) wireless links in facilitating network management and improve network performance. Once aspect includes methods for network management using a high-throughput channel and a low-throughput channel. Other aspects include methods to facilitate practical realization and improve performance of some of the network information theoretic configurations, such as Space-Division Multiple Access (SDMA) in uplink and downlink, Interference Channel, and other forms of distributed collaborative signaling schemes. Another aspect includes methods to support cognitive wireless networks.

DISTRIBUTED COLLABORATIVE SIGNALING IN FULL DUPLEX WIRELESS TRANSCEIVERS
20180014203 · 2018-01-11 ·

Two-way (full-duplex) wireless links in facilitating network management and improve network performance. Once aspect includes methods for network management using a high-throughput channel and a low-throughput channel. Other aspects include methods to facilitate practical realization and improve performance of some of the network information theoretic configurations, such as Space-Division Multiple Access (SDMA) in uplink and downlink, Interference Channel, and other forms of distributed collaborative signaling schemes. Another aspect includes methods to support cognitive wireless networks.

METHOD OF PROVIDING MOBILE COMMUNICATION PROVIDER INFORMATION AND DEVICE FOR PERFORMING THE SAME

A method for providing mobile communication provider information and a device for performing the same are disclosed. A terminal having an eUICC receives data, in which mobile communication provider information is capsulized and included, and stores the received data in the eUICC. Therefore, the mobile communication provider information can be transferred by applying the highest security scheme, and duplication of the eUICC due to the exposure of an authentication key by external hacking attacks can be prevented.

METHOD OF PROVIDING MOBILE COMMUNICATION PROVIDER INFORMATION AND DEVICE FOR PERFORMING THE SAME

A method for providing mobile communication provider information and a device for performing the same are disclosed. A terminal having an eUICC receives data, in which mobile communication provider information is capsulized and included, and stores the received data in the eUICC. Therefore, the mobile communication provider information can be transferred by applying the highest security scheme, and duplication of the eUICC due to the exposure of an authentication key by external hacking attacks can be prevented.

METHOD AND SYSTEM FOR MANAGING ENCRYPTED DATA OF DEVICES
20180013830 · 2018-01-11 ·

A method for managing data of devices using one or more computing entities includes encrypting, by one or more encrypting entities, the data based on encryption policies using encryption keys; storing the encrypted data as ciphertext at a storing entity; requesting decryption keys to decrypt the stored ciphertext by one or more clients; computing restricted decryption keys based on access right policies for the requesting clients by a security management entity; and providing the generated decryption keys to the requesting clients for decrypting the stored ciphertext.

METHOD AND SYSTEM FOR MANAGING ENCRYPTED DATA OF DEVICES
20180013830 · 2018-01-11 ·

A method for managing data of devices using one or more computing entities includes encrypting, by one or more encrypting entities, the data based on encryption policies using encryption keys; storing the encrypted data as ciphertext at a storing entity; requesting decryption keys to decrypt the stored ciphertext by one or more clients; computing restricted decryption keys based on access right policies for the requesting clients by a security management entity; and providing the generated decryption keys to the requesting clients for decrypting the stored ciphertext.

Methods and Systems for Detecting Persons in a Smart Home Environment

The various implementations described herein include methods, devices, and systems for detecting motion and persons. In one aspect, a method is performed at a smart home system that includes a video camera, a server system, and a client device. The video camera captures video and audio, and wirelessly communicates, via the server system, the captured data to the client device. The server system: (1) receives and stores the captured data from the video camera; (2) determines whether an event has occurred, including detected motion; (3) in accordance with a determination that the event has occurred, identifies video and audio corresponding to the event; and (4) classifies the event. The client device receives information indicative of the identified events, displays a user interface for reviewing the video and audio stored by the remote server system, and displays the at least one classification for the event.