Patent classifications
H04W12/06
Vehicle and control method thereof
A personal mobility sharing system includes: a personal mobility, a server, an owner terminal and a member terminal connected through a network, and the server is configured to register a device information of the personal mobility, receive a sharing setting information from the owner terminal, set a sharing mode of the personal mobility based on the sharing setting information, receive an authentication request from the member terminal and transmit an unlock signal to the personal mobility when the authentication request includes pre-registered authentication information.
Electronic device and control method thereof
An electronic device is provided. The electronic device includes a communication interface including circuitry, a memory, and a processor which, based on receiving ID information generated by performing a first encryption process on biometric information and password information generated by performing a second encryption process on the biometric information from an external electronic device through the communication interface, is configured to control the electronic device to: store the ID information and the password information in the memory. The processor, based on receiving first ID information and first password information from the external electronic device, is configured to control the electronic device to: acquire at least one candidate ID information from the memory based on the first ID information, compare password information corresponding to each of the acquired at least one candidate ID information with the first password information to identify one of the candidate ID information, and perform user authentication based on the identified candidate ID information and corresponding password information.
Secure and private cloud based broadcast identification
In one embodiment, a method includes storing, by a tracking server, a hash value for each of one or more tracking devices associated with the tracking server. The method includes receiving, at the tracking server from a user device, a hash value associated with a tracking device, the hash value computed based on a static value uniquely associated with the tracking device and a dynamic value maintained by the tracking device. The method includes identifying, by the tracking server, the tracking device based on a comparison between one of the stored hash values and the received hash value. The method includes updating, by the tracking server, one or more records associated with the identified tracking device based on the receiving the hash value.
Secure and private cloud based broadcast identification
In one embodiment, a method includes storing, by a tracking server, a hash value for each of one or more tracking devices associated with the tracking server. The method includes receiving, at the tracking server from a user device, a hash value associated with a tracking device, the hash value computed based on a static value uniquely associated with the tracking device and a dynamic value maintained by the tracking device. The method includes identifying, by the tracking server, the tracking device based on a comparison between one of the stored hash values and the received hash value. The method includes updating, by the tracking server, one or more records associated with the identified tracking device based on the receiving the hash value.
Communications method, apparatus, and system
A communications method includes determining, by a first platoon member, at least one second platoon member, where the first platoon member and the at least one second platoon member belong to a same platoon, and signal quality of a communication link from the first platoon member to each second platoon member is less than a first preset quality threshold, determining, by the first platoon member, a target communications node, where signal quality of a communication link from the target communications node to each second platoon member is greater than or equal to the first preset quality threshold, and sending, by the first platoon member, to-be-sent data to each second platoon member through the target communications node.
Key-derivation verification in telecommunications network
A telecommunications network includes a serving network and a home network. In some examples the serving network receives, from the home network, identity data associated with a network terminal. The serving network determines a tied key using a tying key derivation function (TKDF) based on the identity data, then prepares an authentication request based on the tied key and sends the request to the terminal. In some examples, the home network receives the identity data from the access network and determines a tied key using a TKDF. The home network then determines a confirmation message based on the first tied key. In some examples, the serving network receives the identity data from the home network, and receives a network-slice selector associated with the network terminal. The serving network determines a tied key using a TKDF based on the identity data and the network-slice selector.
Key-derivation verification in telecommunications network
A telecommunications network includes a serving network and a home network. In some examples the serving network receives, from the home network, identity data associated with a network terminal. The serving network determines a tied key using a tying key derivation function (TKDF) based on the identity data, then prepares an authentication request based on the tied key and sends the request to the terminal. In some examples, the home network receives the identity data from the access network and determines a tied key using a TKDF. The home network then determines a confirmation message based on the first tied key. In some examples, the serving network receives the identity data from the home network, and receives a network-slice selector associated with the network terminal. The serving network determines a tied key using a TKDF based on the identity data and the network-slice selector.
Methods, systems, and devices for federated blockchain-enabled handover authentication
Aspects of the subject disclosure may include, for example, authenticating, by a federated blockchain controller, a user equipment located within a cell coverage area of a network that includes heterogeneous cells. The federated blockchain controller can provide encryption data to the user equipment and corresponding authentication information to one or more multi-access edge computing (MEC) devices associated with the heterogeneous cells to enable secure and efficient handovers for the user equipment amongst the heterogeneous cells, without a need for additional handover reauthentication procedures. Other embodiments are disclosed.
Methods, systems, and devices for federated blockchain-enabled handover authentication
Aspects of the subject disclosure may include, for example, authenticating, by a federated blockchain controller, a user equipment located within a cell coverage area of a network that includes heterogeneous cells. The federated blockchain controller can provide encryption data to the user equipment and corresponding authentication information to one or more multi-access edge computing (MEC) devices associated with the heterogeneous cells to enable secure and efficient handovers for the user equipment amongst the heterogeneous cells, without a need for additional handover reauthentication procedures. Other embodiments are disclosed.
Zero-touch deployment (ZTD) of cellular IoT devices and associated trust model
In one embodiment, a service receives a device registration request sent by an endpoint device, wherein the endpoint device executes an onboarding agent that causes the endpoint device to send the device registration request via a cellular connection to a private access point name (APN) associated with the service. The service verifies that a network address of the endpoint device from which the device registration request was sent is associated with an integrated circuit card identifier (ICCID) or international mobile equipment identity (IMEI) indicated by the device registration request. The service identifies a tenant identifier associated with the ICCID or IMEI. The service sends, based on the tenant identifier, a device registration response to the endpoint device via the private APN.