H04W12/08

MANAGEMENT OF MULTIPLE DEVICES WITHIN AN ANALYTE MONITORING ENVIRONMENT

Systems, devices, and methods are provided for the management of multiple sensor control devices and/or multiple reader devices in an in vivo analyte monitoring environment, and also for resolving conflicts when merging data collected by different reader devices.

USING MULTIPLE CREDENTIALS FOR ACCESS AND TRAFFIC DIFFERENTIATION
20180007057 · 2018-01-04 ·

The disclosure relates in some aspects to establishing connectivity with a network using a first set of credentials and determining whether additional connectivity needs to be established (e.g., using a second set of credentials) to communicate data. The disclosure relates in some aspects to the use of multiple credentials for access and service connectivity. For example, traffic generated by a device may be authorized based on a different set of credentials than the set of credentials used to access the network (e.g., to connect to an LTE network for a PDN connection). In this way, traffic belonging to a specific service or application can be charged and policed based on service specific needs. The disclosure thus relates in some aspects to the use of access credentials and service credentials. These different types of credentials can be used to enable traffic differentiation and policing based on the credentials in use.

USING MULTIPLE CREDENTIALS FOR ACCESS AND TRAFFIC DIFFERENTIATION
20180007057 · 2018-01-04 ·

The disclosure relates in some aspects to establishing connectivity with a network using a first set of credentials and determining whether additional connectivity needs to be established (e.g., using a second set of credentials) to communicate data. The disclosure relates in some aspects to the use of multiple credentials for access and service connectivity. For example, traffic generated by a device may be authorized based on a different set of credentials than the set of credentials used to access the network (e.g., to connect to an LTE network for a PDN connection). In this way, traffic belonging to a specific service or application can be charged and policed based on service specific needs. The disclosure thus relates in some aspects to the use of access credentials and service credentials. These different types of credentials can be used to enable traffic differentiation and policing based on the credentials in use.

METHOD AND APPARATUS FOR CONFIGURING BI-DIRECTIONAL CHANNEL IN WIRELESS COMMUNICATION SYSTEM
20180007723 · 2018-01-04 · ·

A method and apparatus for configuring a bi-directional channel in a wireless communication system is provided. A user equipment (UE) configures the bi-directional channel which is used for either an uplink (UL) channel or a sidelink (SL) channel, and transmits data via at least one of the UL channel or the SL channel. The bi-direction channel may be used for vehicle-to-everything (V2X) communication.

METHOD FOR PROCESSING AN AUTHORIZATION TO IMPLEMENT A SERVICE, DEVICES AND CORRESPONDING COMPUTER PROGRAM
20180007052 · 2018-01-04 ·

A method for processing, by a processing entity, of an authorization to implement a service and/or access an item. The method includes: reception, from a requesting device, of a request for implementing a service and/or accessing an item; searching for an indicator of dependency from at least one piece of data of said request for implementation; when an indicator of dependency is present, obtaining an authorization from a verification device to implement said service and/or access said item.

TOKEN AND CRYPTOGRAM USING TRANSACTION SPECIFIC INFORMATION
20180006821 · 2018-01-04 ·

Systems and methods for token processing are disclosed. An access device can provide access device data to a mobile communication device. The communication device generates a token request including the access device data and communication device data and sends the token request to a server computer. The server computer returns a token and a token cryptogram to the mobile communication device. The token and the cryptogram may be used in a transaction.

Secure Boot and Software Upgrade of A Device
20180004956 · 2018-01-04 ·

A method of securely resetting a first device comprising a UICC, the method comprising providing a secure reset control application to a secure element of the UICC of the first device wherein the secure reset control application is capable of commanding the UICC to provide notification indicative of a secure reset of the first device being requested if a corresponding signal is received from a remote management server; and/or communication between the secure reset control application and a remote management server cannot be established for a predetermined period of time and upon the next first device reset, determine whether a secure reset has been requested.

METHOD AND APPARATUS FOR DISPLAYING WIFI SIGNAL ICON, AND MOBILE TERMINAL

The present disclosure relates to a method for displaying a WiFi signal icon on a mobile terminal. The method includes determining a security level of a current WiFi network, marking a WiFi signal icon according to a color corresponding to the security level, and displaying the marked WiFi signal icon on the mobile terminal.

CORE NETWORK CONNECTIONLESS SMALL DATA TRANSFER
20180007557 · 2018-01-04 ·

Connectionless data transfer is disclosed. Authentication of a device and network node may be performed when data is sent from the device to an application server of an application service provider via a selected network. The transfer of data may take place in an absence of an existing device context between the network node interacting with the device and the core network through which the data travels. State management overhead and signaling overhead may be reduced by use of the exemplary aspects disclosed herein. For example, the device does not need to perform an authentication and key agreement (AKA) procedure to transfer the data and an existing (or pre-existing) device context need not be maintained at the core network.

CORE NETWORK CONNECTIONLESS SMALL DATA TRANSFER
20180007557 · 2018-01-04 ·

Connectionless data transfer is disclosed. Authentication of a device and network node may be performed when data is sent from the device to an application server of an application service provider via a selected network. The transfer of data may take place in an absence of an existing device context between the network node interacting with the device and the core network through which the data travels. State management overhead and signaling overhead may be reduced by use of the exemplary aspects disclosed herein. For example, the device does not need to perform an authentication and key agreement (AKA) procedure to transfer the data and an existing (or pre-existing) device context need not be maintained at the core network.