Patent classifications
H04W12/04
METHOD AND APPARATUS FOR MULTIPLE REGISTRATIONS
A user device having a security context with a first network based on a first key may establish a security context with a second network. In a method, the user device may generate a key identifier based on the first key and a network identifier of the second network. The user device may forward the key identifier to the second network for forwarding to the first network by the second network to enable the first network to identify the first key at the first network. The user device may receive a key count from the second network. The key count may be associated with a second key forwarded to the second network from the first network. The user device may generate the second key based on the first key and the received key count thereby establishing a security context between the second network and the user device.
METHOD AND APPARATUS FOR MULTIPLE REGISTRATIONS
A user device having a security context with a first network based on a first key may establish a security context with a second network. In a method, the user device may generate a key identifier based on the first key and a network identifier of the second network. The user device may forward the key identifier to the second network for forwarding to the first network by the second network to enable the first network to identify the first key at the first network. The user device may receive a key count from the second network. The key count may be associated with a second key forwarded to the second network from the first network. The user device may generate the second key based on the first key and the received key count thereby establishing a security context between the second network and the user device.
Authentication method, wearable device and mobile device
In an authentication method, a wireless communication is established between a mobile device and a wearable device. A proximity is detected between the mobile device and the wearable device by comparing mobile device position information and wearable device position information. Access to the mobile device is granted based on a detected proximity.
Mobility management for RRC_INACTIVE user equipment
A method for radio access network (RAN) based notification area (RNA) update for a radio resource control (RRC)_INACTIVE user equipment (UE) in an RRC_INACTIVE state is disclosed. The method includes receiving, by the RRC_INACTIVE UE in the RRC_INACTIVE state, a first list of RAN area identities (IDs) from a first cell; receiving, by the RRC_INACTIVE UE in the RRC_INACTIVE state, identification information broadcast by a second cell, the identification information including a RAN area ID of the second cell and a cell ID of the second cell; and transmitting, by the RRC_INACTIVE UE in the RRC_INACTIVE state, at least one of an inactive-radio network temporary identifier (I-RNTI) and a cell ID of the first cell to the second cell, after determining that the RAN area ID of the second cell does not belong to the first list of RAN area IDs.
Mobility management for RRC_INACTIVE user equipment
A method for radio access network (RAN) based notification area (RNA) update for a radio resource control (RRC)_INACTIVE user equipment (UE) in an RRC_INACTIVE state is disclosed. The method includes receiving, by the RRC_INACTIVE UE in the RRC_INACTIVE state, a first list of RAN area identities (IDs) from a first cell; receiving, by the RRC_INACTIVE UE in the RRC_INACTIVE state, identification information broadcast by a second cell, the identification information including a RAN area ID of the second cell and a cell ID of the second cell; and transmitting, by the RRC_INACTIVE UE in the RRC_INACTIVE state, at least one of an inactive-radio network temporary identifier (I-RNTI) and a cell ID of the first cell to the second cell, after determining that the RAN area ID of the second cell does not belong to the first list of RAN area IDs.
Automated Delivery Security System
A method and system for providing access to a location secured by an electronically activated locking mechanism, the method comprising: detecting a geographical position of a mobile device. Determining that the detected geographical position of the mobile device is proximate to the location secured by the electronically activated locking mechanism. Transmitting a signal causing the electronically activated locking mechanism to unlock.
Automated Delivery Security System
A method and system for providing access to a location secured by an electronically activated locking mechanism, the method comprising: detecting a geographical position of a mobile device. Determining that the detected geographical position of the mobile device is proximate to the location secured by the electronically activated locking mechanism. Transmitting a signal causing the electronically activated locking mechanism to unlock.
Electronic device and method for generating attestation certificate based on fused key
An electronic device and method of operating an electronic device are provided. The electronic device includes an integrated circuit including at least one key, at least one processor including the integrated circuit, and a memory operatively connected to the at least one processor. The memory stores instructions that, when executed, cause the at least one processor to obtain at least one piece of hardware information related to the electronic device, generate a signed certificate signing request including the at least one piece of hardware information, based on the at least one key, transmit the signed certificate signing request to an external electronic device, receive an attestation certificate generated based on the signed certificate signing request, from the external electronic device, and store the received attestation certificate in the memory.
ELECTRONIC SUBSCRIBER IDENTITY MODULE TRANSFER ELIGIBILITY CHECKING
Embodiments described herein relate to eligibility checking for transfer of one or more electronic subscriber identity modules (eSIMs) between two mobile wireless devices. Eligibility to transfer an eSIM to an eUICC of a target device can depend on whether the eUICC of the target device satisfies certain security requirements for the eSIMs to be transferred. The mobile wireless devices can obtain a transfer eligibility result based on communication with one or more network-based servers that can determine compatibility for eSIM transfer.
METHOD FOR REMOTELY PROGRAMMING A PROGRAMMABLE DEVICE
A method for remotely programming a programmable device designed to provide an expected sensitive result. The method including transmitting a first program code to the programmable device, the first program code being configured to get at least one distinctive data unique and physically inherent to the programmable device, retrieving the distinctive data, and transmitting a second program code based on the retrieved distinctive data to the programmable device, so as to load the second program code into the programmable device.