H04W12/06

Secure communication between a contact lens and an accessory device

Described herein are systems and methods that allow for secure wireless communication between a contact lens system and an accessory device to protect sensitive data and prevent unauthorized access to confidential information. In certain embodiments, tampering attempts by potential attackers are thwarted by using a Physically Unclonable Functions (PUF) circuit that is immune to reverse engineering. In addition, sensors monitor a to-be-protected electronic device to detect tampering attempts and physical attacks to ensure the physical integrity of the communication system.

Method and device for provisioning a node in a wireless network

A device may receive data relating to a site plan and image data relating to a network device. The device may determine a device identifier based on the image data, associate the device identifier with the site plan based on a common attribute between the network device and the site plan, and cause a certificate to be generated based on an authentication request to a network controller. The authentication request may cause the network controller to generate the certificate based on the device identifier and/or the site plan. The device may cause an Internet protocol (IP) address to be assigned to the network device based on the certificate, a location of the network device, and/or another related parameter, cause a node configuration to be generated based on the IP address, the device identifier, and/or the site plan, and provision the network device according to the node configuration.

Multidimensional attribute authentication

A user requesting authentication is presented a keypad that includes multiple keys and respective keys include a character that is associated with a shape. Responsive to selection of a key, a first set of attributes is activated for selection. Responsive to determining a selection of an attribute from the first set of attributes, activating one or more additional sets of attributes associated with the first key. Responsive to determining a selection from the one or more additional sets of attributes, determining whether a selection of an additional key is made. Responsive to determining the selection of the additional key, activating for selection a first set of attributes and one or more additional sets of attributes of the additional key, and responsive to determining selections of keys and corresponding attributes associated with the selection of respective keys, determining the validity of the authentication code.

Multidimensional attribute authentication

A user requesting authentication is presented a keypad that includes multiple keys and respective keys include a character that is associated with a shape. Responsive to selection of a key, a first set of attributes is activated for selection. Responsive to determining a selection of an attribute from the first set of attributes, activating one or more additional sets of attributes associated with the first key. Responsive to determining a selection from the one or more additional sets of attributes, determining whether a selection of an additional key is made. Responsive to determining the selection of the additional key, activating for selection a first set of attributes and one or more additional sets of attributes of the additional key, and responsive to determining selections of keys and corresponding attributes associated with the selection of respective keys, determining the validity of the authentication code.

Management of near field communications using low power modes of an electronic device

Systems, methods, and computer-readable media for managing near field communications during a low power management mode of an electronic device are provided that may make credentials of a near field communication (“NFC”) component appropriately secure and appropriately accessible while also limiting the power consumption of the NFC component and of other components of the electronic device.

System and Method for Performing Identity Management

A method of verifying an identity of a wireless device. The method comprising receiving a calling station identity from a SIM of a wireless device, receiving a secure identifier derived by a secure element of the wireless device, comparing the received calling station identity to calling station identities of authorized wireless devices to identify obtain a corresponding wireless device identity, confirming whether the secure identifier is authentic and determining a second wireless device identity from the secure identifier, and comparing the first wireless device identity and the second wireless device identity to verify the identity of the wireless device.

System and Method for Performing Identity Management

A method of verifying an identity of a wireless device. The method comprising receiving a calling station identity from a SIM of a wireless device, receiving a secure identifier derived by a secure element of the wireless device, comparing the received calling station identity to calling station identities of authorized wireless devices to identify obtain a corresponding wireless device identity, confirming whether the secure identifier is authentic and determining a second wireless device identity from the secure identifier, and comparing the first wireless device identity and the second wireless device identity to verify the identity of the wireless device.

Connecting a Remote User Equipment to a Cellular Network
20230011576 · 2023-01-12 ·

There is provided a performed by a first node for use in connecting a remote user equipment (UE) to a cellular network. An identity of the remote UE is acquired (102). A cryptographic function is applied (104) to the identity of the remote UE to generate a string identity for the remote UE. The string identity for the remote UE is stored (106) in a memory with the identity of the remote UE for use in connecting the remote UE to the cellular network via a relay UE connected to the cellular network.

WIRELESS CONNECTION SYSTEM, INFORMATION TERMINAL, DISPLAY DEVICE, AND WIRELESS CONNECTION METHOD
20230009449 · 2023-01-12 ·

A wireless connection system executes wireless connection between an information terminal of a user and a display device installed in environment. In a case where an information terminal existing in the vicinity thereof is detected, the display device displays device ID information related to authentication for wireless connection with the detected information terminal (or an image obtained by coding it) on a display screen. The information terminal confirms whether the device ID information read from the display screen match device ID information of an own device or not, and establishes wireless connection using an authentication ID for wireless connection with the display device after matching is confirmed. The display device establishes wireless connection with the information terminal using an authentication ID.

WIRELESS CONNECTION SYSTEM, INFORMATION TERMINAL, DISPLAY DEVICE, AND WIRELESS CONNECTION METHOD
20230009449 · 2023-01-12 ·

A wireless connection system executes wireless connection between an information terminal of a user and a display device installed in environment. In a case where an information terminal existing in the vicinity thereof is detected, the display device displays device ID information related to authentication for wireless connection with the detected information terminal (or an image obtained by coding it) on a display screen. The information terminal confirms whether the device ID information read from the display screen match device ID information of an own device or not, and establishes wireless connection using an authentication ID for wireless connection with the display device after matching is confirmed. The display device establishes wireless connection with the information terminal using an authentication ID.