Patent classifications
H04W12/10
Enhanced LDACS system having different user classes and associated methods
An enhanced L-band Digital Aeronautical Communications System (LDACS) may include LDACS ground stations; and a LDACS airborne stations, each configured to communicate with the LDACS ground stations at a given class of service from among different classes of service. The enhanced LDACS may also include a network controller configured to operate the LDACS ground stations and LDACS airborne stations at the different user classes of service.
Enhanced LDACS system having different user classes and associated methods
An enhanced L-band Digital Aeronautical Communications System (LDACS) may include LDACS ground stations; and a LDACS airborne stations, each configured to communicate with the LDACS ground stations at a given class of service from among different classes of service. The enhanced LDACS may also include a network controller configured to operate the LDACS ground stations and LDACS airborne stations at the different user classes of service.
Executing untrusted commands from a distributed execution model
Systems and methods are disclosed for generating a distributed execution model with untrusted commands. The system can receive a query, and process the query to identify the untrusted commands. The system can use data associated with the untrusted command to identify one or more files associated with the untrusted command. Based on the files, the system can generate a data structure and include one or more identifiers associated with the data structure in the distributed execution model. The system can distribute the distributed execution model to one or more nodes in a distributed computing environment for execution.
Product Packaging and Associated System and Method for Authenticating a Product
Product packaging includes a packaging container configured to contain product. The packaging also includes a first tag disposed on the packaging container and encoded with a first one of a plurality of package attributes and a second code disposed on the packaging container and encoded with a second one of the plurality of package attributes. The first tag and the second tag are linked to each other to determine authenticity of the product.
Determining an environmental parameter from sensor data of a plurality of automobiles using a cellular network
An automobile device receives first data from one or more transmitters located in an automobile. A random access preamble is transmitted on an uplink carrier to a base station in response to a pre-defined condition being met based on at least one of the following: the first data; a value of an internal timer; and a user input. A first message is transmitted to a network server via the base station over a bearer. The first message is configured to trigger establishment of a connection to the network server. A second message is received from the network server via the base station over the bearer. The second message is configured to cause transmission of the first data to the network server. The first data is transmitted to the base station via an established bearer.
Determining an environmental parameter from sensor data of a plurality of automobiles using a cellular network
An automobile device receives first data from one or more transmitters located in an automobile. A random access preamble is transmitted on an uplink carrier to a base station in response to a pre-defined condition being met based on at least one of the following: the first data; a value of an internal timer; and a user input. A first message is transmitted to a network server via the base station over a bearer. The first message is configured to trigger establishment of a connection to the network server. A second message is received from the network server via the base station over the bearer. The second message is configured to cause transmission of the first data to the network server. The first data is transmitted to the base station via an established bearer.
Method and apparatus for setting profile
A method and apparatus for setting profiles are provided. The profile setting method includes receiving, from a first terminal, a profile transfer request message that requests transfer of a first profile or portion thereof from a first secure element to a second secure element; configuring a second profile using the first profile or portion thereof; and sending, to a second terminal, the configured second profile.
AMF Re-Allocation Due to Slicing
In a wireless communication network implementing network slicing (NS), an Initial Access and Mobility Management Function (AMF) for a user equipment (UE) in one NS is able to re-allocate a UE to a Target AMF in a different NS, despite not being able to directly communicate with the Target AMF due to NS security restrictions. In a first embodiment, the Initial AMF transfers the UE context—including its security context—to a Default AMF. The Default AMF has the capability to communicate with network functions in different NSes. The Default AMF transfers the UE context to the Target AMF. In a second embodiment, a security key Kamf′ is horizontally derived in a manner that avoids NS security conflicts. The derived key is transferred to the UE and Target AMF, which establish a security context. In a third embodiment, the Initial AMF allocates a Token, and transfers it, along with the UE security context (directly or via RAN) to the Default AMF. The Default AMF then transfers the security context to the Target AMF.
SECURE SUPPLY CHAIN AND PROVISIONING OF DEVICES AND METHODS
Disclosed are adaptable, auditable, and seamless provisioning systems, methods and processes that allow easy deployment and provisioning of devices and device components through a device manufacturing process and end user deployment. The systems and methods create a cryptographic proof that devices and associated components are authentic, securely set-up, and operated throughout the lifetime of the device. Methods and systems are provided to securely provision devices and components throughout a supply chain and deploy into an environment.
HTTP/3 AND QUIC-BASED DEVICE AND APPLICATION CHARACTERIZATION
A system may include a first network device. The first network device may include a first processor configured to: obtain a copy of a first message sent from an application on a User Equipment device (UE); construct a signature based on the copy of the first message; and send a second message including the signature to a second network device. The second message may request the second network device to either train a classification model or to provide a device type of the UE or an application type of the application to the first network device.