Patent classifications
H04W12/10
Apparatus, system and method for mobile communication
In order for making MTC more efficient and/or secure, a base station forming a communication system connects a UE to a core network. A node serves as an entering point to the core network for a service provider, and transmits traffic between the service provider and the UE. The node establishes, as a connection to the base station, a first connection for directly transceiving messages between the node and the base station. Alternatively, the node establishes a second connection for transparently transceiving the messages through a different node that is placed within the core network and has established a different secure connection to the base station.
Apparatus, system and method for mobile communication
In order for making MTC more efficient and/or secure, a base station forming a communication system connects a UE to a core network. A node serves as an entering point to the core network for a service provider, and transmits traffic between the service provider and the UE. The node establishes, as a connection to the base station, a first connection for directly transceiving messages between the node and the base station. Alternatively, the node establishes a second connection for transparently transceiving the messages through a different node that is placed within the core network and has established a different secure connection to the base station.
Communication apparatus and method for secure low power transmission
The present disclosure provides a communication apparatus comprising a cryptographic circuitry which, in operation, uses a shared cryptographic secret Key and a cryptographic salt to generate a cryptographically encoded Message Integrity Code (MIC) that is computed over the address field of a Wake Up Radio (WUR) frame; and a transmission signal generator which, in operation, generates a secure WUR signal by replacing the address field of the WUR frame with the MIC; and a transmitter which, in operation, transmits the secure WUR signal.
Systems and methods for securely monitoring a shipping container for an environmental anomaly
Systems and methods are described for securely monitoring a shipping container for an environmental anomaly using elements of a wireless node network of sensor-based ID nodes disposed within the container and a command node associated with the container. The method has the command node identifying which of the ID nodes are confirmed as trusted sensors based upon a security credential specific to each of the ID nodes; monitoring only the confirmed ID nodes for sensor data broadcast those ID nodes; detecting the anomaly based upon the sensor data from at least one of the confirmed ID nodes; automatically generating an alert notification related to the detected environmental anomaly for the shipping container; and transmitting the alert notification to the external transceiver to initiate a mediation response related to the detected environmental anomaly.
Systems and methods for vehicle configuration verification with failsafe code
A computer system for verifying vehicle software configuration may be provided. The computer system may include a processor and a non-transitory, tangible, computer-readable storage medium having instructions stored thereon that, in response to execution by the processor, cause the processor to: (1) transmit, to a vehicle computing system, an authentication request including a hash algorithm specification; (2) receive, from the vehicle computing system, a current configuration hash value and a vehicle identifier; (3) retrieve a trusted data block from a memory based upon the vehicle identifier, the trusted data block including a stored configuration hash value and a smart contract code segment; (4) execute the smart contract code segment, the smart contract code segment including a failsafe code segment; and/or (5) transmit the authentication response to the vehicle computing system, and cause the vehicle computing system to execute the failsafe code segment.
System having tracker data validation
Methods and apparatus for providing validation of data from the tracker devices. In embodiments, a method includes registering a tracker device with a device registry and issuing by an issuer the tracker device to a third party. Raw and signed data is collected from the tracker device is hashed and stored to enable later validation of the data.
Method and apparatus for managing data session in wireless communication system
A method performed by a user equipment (UE) in a wireless communication system is provided. The method may include: receiving, from a network entity, information associated with one or more quality of service (QoS) rules; checking the information associated with the one or more QoS rules, for a QoS rule associated with a non-default QoS rule and for the QoS rule with a rule operation different from deleting the QoS rule; in case that the UE is in a narrow band (NB)-N1 mode, the QoS rule is associated with the non-default QoS rule and the rule operation is different from deleting the QoS rule, detecting the QoS rule as an error; and transmitting, to the network entity, a protocol data unit (PDU) session modification request message to delete the detected QoS rule.
Method and apparatus for managing data session in wireless communication system
A method performed by a user equipment (UE) in a wireless communication system is provided. The method may include: receiving, from a network entity, information associated with one or more quality of service (QoS) rules; checking the information associated with the one or more QoS rules, for a QoS rule associated with a non-default QoS rule and for the QoS rule with a rule operation different from deleting the QoS rule; in case that the UE is in a narrow band (NB)-N1 mode, the QoS rule is associated with the non-default QoS rule and the rule operation is different from deleting the QoS rule, detecting the QoS rule as an error; and transmitting, to the network entity, a protocol data unit (PDU) session modification request message to delete the detected QoS rule.
5G broadcast/multicast security
A user equipment (UE) may receive a quality of service (QoS) flow for a multicast or broadcast service that is secured with a multicast-broadcast key. The UE may transmit a data session establishment request to a service management function (SMF) for the multicast or broadcast service. The UE may receive at least one multicast-broadcast key for the PDU session. The UE may determine a radio bearer (RB) configuration for the multicast or broadcast service. The UE may receive one or more QoS flow packets for the multicast or broadcast service over the RB. The UE may decode the one or more QoS flow packets using the at least one multicast-broadcast key, or a key derived from the at least one multicast-broadcast key. Decoding may include decrypting, verifying the integrity, or a combination thereof.
Method for ensuring the integrity of data to ensure operational safety and vehicle-to-X device
A method for ensuring integrity of data sent by a vehicle V2X communication device to a control module to ensure operational safety, including: receiving data transferred by vehicle-to-X communication by a first computing apparatus of the V2X communication device, storing the data in a data memory, forwarding the data to a second computing apparatus, receiving the data by the second computing apparatus, establishing whether an action is to be triggered for the data and, in response, transmitting the data to a comparison apparatus, carrying out a comparison test for the data provided by the second computing apparatus with the data stored in the data memory and, in response to the test being passed, outputting the data and/or a control instruction and/or a warning message by the V2X communication device to a control module. Furthermore, a corresponding vehicle-to-X device and the use of the device in a vehicle are disclosed.