H04W12/50

Communication apparatus, control method, and computer-readable storage medium
11553349 · 2023-01-10 · ·

A communication apparatus receives a signal that is transmitted from a partner apparatus using a first communication scheme, and establishes, on the basis that the signal received includes information indicating that parameter exchange processing is to be executed, a connection with the partner apparatus using a second communication scheme, wherein the second communication scheme has a higher communication rate and consumes more power than the first communication scheme. In addition, the communication apparatus exchanges, by using the second communication scheme, information to be used in communication for the parameter exchange processing with the partner apparatus, and executes the parameter exchange processing using the information by using the second communication unit scheme.

Communication apparatus, control method, and computer-readable storage medium
11553349 · 2023-01-10 · ·

A communication apparatus receives a signal that is transmitted from a partner apparatus using a first communication scheme, and establishes, on the basis that the signal received includes information indicating that parameter exchange processing is to be executed, a connection with the partner apparatus using a second communication scheme, wherein the second communication scheme has a higher communication rate and consumes more power than the first communication scheme. In addition, the communication apparatus exchanges, by using the second communication scheme, information to be used in communication for the parameter exchange processing with the partner apparatus, and executes the parameter exchange processing using the information by using the second communication unit scheme.

Method and system for authenticating a secure credential transfer to a device
11552798 · 2023-01-10 · ·

A method for authenticating a secure credential transfer to a device includes verifying user identity and device identity. In particular, the method includes verifying user identity by requesting and receiving a user identification input at a first client device and verifying device identity of a second client device by (i) determining a security status of the second client device from hardware of the second client device, (ii) invoking an identifier related to the security status of the second client device to an authentication server, and (iii) obtaining certification from the authentication server for the second client device based on the invoked identifier. After verifying the user identity and the device identity, the method includes establishing a secure channel between the first client device and the second client device for the secure credential transfer using one or more tokens generated by the authentication server.

Secure pairing and pairing lock for accessory devices

Embodiments described herein provide a service to enable a user to track a variety of even when those devices are not connected to the internet by either Wi-Fi or cellular. One embodiment provides techniques to enable a pairing registration for a wireless accessory device that enables a server-mediated pairing process to be performed between the wireless accessory device and a companion device.

Secure pairing and pairing lock for accessory devices

Embodiments described herein provide a service to enable a user to track a variety of even when those devices are not connected to the internet by either Wi-Fi or cellular. One embodiment provides techniques to enable a pairing registration for a wireless accessory device that enables a server-mediated pairing process to be performed between the wireless accessory device and a companion device.

Terminal device and communication method for terminal device
11696125 · 2023-07-04 · ·

A communication system implemented providing a service based on ProSe under the management of a network operator. Processing based on a discovery request procedure for discovering a proximity terminal is performed based on authentication of a server device operated by the network operator. In addition, the network operator updates the processing based on the discovery request procedure in accordance with a policy of the network operator.

Terminal device and communication method for terminal device
11696125 · 2023-07-04 · ·

A communication system implemented providing a service based on ProSe under the management of a network operator. Processing based on a discovery request procedure for discovering a proximity terminal is performed based on authentication of a server device operated by the network operator. In addition, the network operator updates the processing based on the discovery request procedure in accordance with a policy of the network operator.

Dialysis machine, a fluid preparation device, and methods for establishing secure communication between a dialysis machine and a fluid preparation device

The present disclosure relates to establishing secure communication between a dialysis machine and a fluid preparation device. In an example, a dialysis machine includes a control unit configured to establish a short-range wireless connection with an external fluid preparation device. The control unit establishes the short-range wireless connection by causing a user interface to display a prompt to enter a passkey associated with a fluid preparation device, using the received passkey to pair with the fluid preparation device, and creating a new bonding table or write to an empty bonding table using the passkey. The control unit is also configured to generate a shared key using the passkey and at least one predetermined criterion and use the shared key to authenticate with the fluid preparation device. When authentication with the fluid preparation device is successful, the control unit enables data communication using the short-range connection with the fluid preparation device.

Managing permissions for different wireless devices to control a common host device

Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.

Managing permissions for different wireless devices to control a common host device

Disclosed herein is a technique for managing permissions associated with the control of a host device that are provided to a group of wireless devices. The host device is configured to pair with a first wireless device. In response to pairing with the first wireless device, the host device grants a first level of permissions for controlling the host device to the first wireless device. Subsequently, the host device can receive a second request from a second wireless device to pair with the host device. In response to pairing with the second wireless device, the host device can grant a second level of permissions for controlling the host device to second wireless device, where the second level of permissions is distinct from the first level of permissions.