H04W12/06

METHOD AND APPARATUS FOR REGISTRATION AND PROTOCOL DATA UNIT SESSION ESTABLISHMENT FOR ONBOARDING OF USER EQUIPMENT IN MOBILE COMMUNICATION SYSTEM
20230043899 · 2023-02-09 ·

A method for an access and mobility management function (AMF) to register a user equipment (UE) and establish a session in a standalone non-public network (SNPN) is provided. The method includes receiving a registration request message from the UE through a base station, wherein the registration request message includes an onboarding indication, an onboarding subscriber concealed identifier (SUCI) set to “SNPN onboarding,” and default UE credentials, selecting a session management function (SMF) to establish a restricted protocol data unit (PDU) session for remote provisioning of the UE, transmitting a PDU session establishment request message to the selected SMF, receiving a PDU session establishment response message including information indicating PDU session establishment acceptance and a PDU session identifier (ID) from the SMF, and transmitting a message indicating UE registration and PDU session establishment acceptance to the UE through the base station.

Key update method and apparatus
11595206 · 2023-02-28 · ·

Embodiments of this application provide key update methods and apparatuses in the field of communications technologies. A communications system includes a terminal and a core network device. The terminal can access the core network device using both a first access technology and a second access technology. The first connection and the second connection have a shared key. Key update for the first connection is performed in obtaining a first key identifier that identifies a first key obtained by performing the key update for the first connection. In response to determining that the second connection is in a connected state, the shared key for the second connection and a second key identifier that identifies the shared key are retained. The shared key is kept using for the second connection before performing key update for the second connection.

Key update method and apparatus
11595206 · 2023-02-28 · ·

Embodiments of this application provide key update methods and apparatuses in the field of communications technologies. A communications system includes a terminal and a core network device. The terminal can access the core network device using both a first access technology and a second access technology. The first connection and the second connection have a shared key. Key update for the first connection is performed in obtaining a first key identifier that identifies a first key obtained by performing the key update for the first connection. In response to determining that the second connection is in a connected state, the shared key for the second connection and a second key identifier that identifies the shared key are retained. The shared key is kept using for the second connection before performing key update for the second connection.

Facial profile password to modify user account data for hands free transactions

An account management system establishes an account for a user. The user enters user account information into the account and the account management system establishes a facial template for the user based on an image of the face of the user. The user requests to change user account information at a merchant POS (POS) device. The merchant POS device captures a facial image of the user and transmits the image the account management system, which generates a facial template and compares the generated facial template against the existing facial template associated with user account. If the generated facial template is less than a threshold difference from the existing facial template, the user may update user account information at the merchant POS device, which communicates the updated user account information to the account management system. The account management system associates the updated user account information with the user account.

Facial profile password to modify user account data for hands free transactions

An account management system establishes an account for a user. The user enters user account information into the account and the account management system establishes a facial template for the user based on an image of the face of the user. The user requests to change user account information at a merchant POS (POS) device. The merchant POS device captures a facial image of the user and transmits the image the account management system, which generates a facial template and compares the generated facial template against the existing facial template associated with user account. If the generated facial template is less than a threshold difference from the existing facial template, the user may update user account information at the merchant POS device, which communicates the updated user account information to the account management system. The account management system associates the updated user account information with the user account.

Deploying idle transceivers for rapid connection of Wi-Fi clients
11595868 · 2023-02-28 · ·

Responsive to receiving a probe request at an idle transceiver over a first channel from a Wi-Fi client and a determination that the Wi-Fi client is not currently associated with the access point for service, a second channel being used for client service is identified. A probe response frame is generated including a CSA (channel switch announcement) indicating the second channel and transmitted to the Wi-Fi client causing authentication over the second channel. The Wi-Fi client is then serviced over the at least one non-idle transceiver over the second channel.

System, method and computer program product for secure Bluetooth cryptography in a virtual mobile device platform
11596008 · 2023-02-28 · ·

Embodiments are disclosed that allow encrypted data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, a Bluetooth implementation on the physical device may include one or more raw interfaces to facilitate endpoint to endpoint secure Bluetooth cryptography. Using these raw interfaces, an encrypted Bluetooth channel may be established directly between the virtual device and the Bluetooth enabled device using the radio of the physical device, where data may be encrypted and decrypted at an endpoint of the Bluetooth communication channel (such as at the virtual device or the Bluetooth enabled device) and passed through a Bluetooth implementation on the physical device without any additional encryption or decryption being performed on that data.

System, method and computer program product for secure Bluetooth cryptography in a virtual mobile device platform
11596008 · 2023-02-28 · ·

Embodiments are disclosed that allow encrypted data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, a Bluetooth implementation on the physical device may include one or more raw interfaces to facilitate endpoint to endpoint secure Bluetooth cryptography. Using these raw interfaces, an encrypted Bluetooth channel may be established directly between the virtual device and the Bluetooth enabled device using the radio of the physical device, where data may be encrypted and decrypted at an endpoint of the Bluetooth communication channel (such as at the virtual device or the Bluetooth enabled device) and passed through a Bluetooth implementation on the physical device without any additional encryption or decryption being performed on that data.

Electronic apparatus and method of selectively applying security mode in mobile device
11595507 · 2023-02-28 ·

A mobile device includes a user interface having a display panel and a touch panel, a network interface to communicate with an external network, a memory to store a password and an authorized user, a functional unit to sense a user and a motion of the mobile device during a power saving mode, and a control unit to control operations of the mobile device, and to perform an unlocking operation during the power saving mode to unlock the mobile device. The unlocking operation includes a motion detection process of sensing the motion of the mobile device, a user identification process of determining that a sensed user represents the authorized user, in response to the sensed motion of the motion detecting process, and an unlocking process of unlocking the mobile device according to the determination of the user identification process.

Electronic apparatus and method of selectively applying security mode in mobile device
11595507 · 2023-02-28 ·

A mobile device includes a user interface having a display panel and a touch panel, a network interface to communicate with an external network, a memory to store a password and an authorized user, a functional unit to sense a user and a motion of the mobile device during a power saving mode, and a control unit to control operations of the mobile device, and to perform an unlocking operation during the power saving mode to unlock the mobile device. The unlocking operation includes a motion detection process of sensing the motion of the mobile device, a user identification process of determining that a sensed user represents the authorized user, in response to the sensed motion of the motion detecting process, and an unlocking process of unlocking the mobile device according to the determination of the user identification process.