H04W12/50

DEVICES AND METHOD FOR MTC GROUP KEY MANAGEMENT
20220407846 · 2022-12-22 · ·

In order to improve security upon distributing a group key, there is provided a gateway (20) to a core network for a group of MTC devices (10_1-10_n) communicating with the core network. The gateway (20) protects confidentiality and integrity of a group key, and distributes the protected group key to each of the MTC devices (10_1-10_n). The protection is performed by using: a key (Kgr) that is preliminarily shared between the gateway (20) and each of the MTC devices (10_1-10_n), and that is used for the gateway (20) to authenticate each of the MTC devices (10_1-10_n) as a member of the group; or a key (K_iwf) that is shared between an MTC-IWF (50) and each of the MTC devices (10_1-10_n), and that is used to derive temporary keys for securely conducting individual communication between the MTC-IWF (50) and each of the MTC devices (10_1-10_n).

AUTOMATIC ASSOCIATION OF A NON-MEDICAL DEVICE WITH A MEDICAL DEVICE
20220408267 · 2022-12-22 ·

Techniques disclosed herein relate to automatic association of a non-medical device with a medical device. In some embodiments, the techniques involve accessing a user account provided by a cloud-based service, retrieving first identification information that is stored to the user account and identifies a medical device via the cloud-based service, receiving second identification information from the medical device, and establishing a secure communication link with the medical device based on determining that the second identification information corresponds to or matches the first identification information.

AUTOMATIC ASSOCIATION OF A NON-MEDICAL DEVICE WITH A MEDICAL DEVICE
20220408267 · 2022-12-22 ·

Techniques disclosed herein relate to automatic association of a non-medical device with a medical device. In some embodiments, the techniques involve accessing a user account provided by a cloud-based service, retrieving first identification information that is stored to the user account and identifies a medical device via the cloud-based service, receiving second identification information from the medical device, and establishing a secure communication link with the medical device based on determining that the second identification information corresponds to or matches the first identification information.

BLUETOOTH LOW ENERGY (BLE) ADVERTISING PACKET SECURITY
20220408266 · 2022-12-22 ·

Secure pairing of computing devices, such as a field tool and a battery-powered device (BPD), may include generating by the BPD a challenge message including a randomly-generated challenge, and receiving at the field tool a challenge message from the BPD via a Bluetooth low-energy (BLE) advertisement message. The challenge message can include a randomly-generated challenge and can be issued in a scannable undirected advertising message. The challenge key can be calculated via a secure hash algorithm (SHA) to obtain a response solution. The response solution can be sent by the field tool to the advertising device in response to the challenge message. The response solution can be verified by the BPD using a cryptographic message authentication code such as an HMAC, and the BPD sends a confirmation message to the field tool indicating that the response solution is verified as correct.

BLUETOOTH LOW ENERGY (BLE) ADVERTISING PACKET SECURITY
20220408266 · 2022-12-22 ·

Secure pairing of computing devices, such as a field tool and a battery-powered device (BPD), may include generating by the BPD a challenge message including a randomly-generated challenge, and receiving at the field tool a challenge message from the BPD via a Bluetooth low-energy (BLE) advertisement message. The challenge message can include a randomly-generated challenge and can be issued in a scannable undirected advertising message. The challenge key can be calculated via a secure hash algorithm (SHA) to obtain a response solution. The response solution can be sent by the field tool to the advertising device in response to the challenge message. The response solution can be verified by the BPD using a cryptographic message authentication code such as an HMAC, and the BPD sends a confirmation message to the field tool indicating that the response solution is verified as correct.

Wireless service provider system for selling and/or activating wireless services for a wireless device
11533599 · 2022-12-20 · ·

A method and system for the purchase and activation of services on a wireless device are provided. The method and system include the use of an airtime card with a near field communication tag with a unique identifier code used to improve a user's experience and ease of activation/provisioning of services for the wireless device. In some aspects, the unique identifier may be generated during the activation and purchase of the wireless service and it is not required that the unique identifier code be recorded in a backend system of the wireless provider prior to activation. The services to be purchased and activated may include at least one of the following: out of the box activation, device upgrades, device reactivations, wireless number changes, wireless number porting, and the addition or purchasing of services including airtime, data, and/or SMS enrollments or data content.

Wireless service provider system for selling and/or activating wireless services for a wireless device
11533599 · 2022-12-20 · ·

A method and system for the purchase and activation of services on a wireless device are provided. The method and system include the use of an airtime card with a near field communication tag with a unique identifier code used to improve a user's experience and ease of activation/provisioning of services for the wireless device. In some aspects, the unique identifier may be generated during the activation and purchase of the wireless service and it is not required that the unique identifier code be recorded in a backend system of the wireless provider prior to activation. The services to be purchased and activated may include at least one of the following: out of the box activation, device upgrades, device reactivations, wireless number changes, wireless number porting, and the addition or purchasing of services including airtime, data, and/or SMS enrollments or data content.

Systems and methods for remotely controlling a surgical instrument of console-based surgical systems
11533764 · 2022-12-20 · ·

A surgical system and a method of operating a surgical system are disclosed herein. The surgical system comprises a surgical console, a control device, and a dongle. The surgical console operates a surgical device and comprises a connection port. The control device communicates with the surgical console to remotely control the surgical device. The dongle physically couples to the connection port of the surgical console. The control device comprises a first communication device and a radio frequency (RF) reader, and the dongle comprises a second communication device and a passive RF device. The RF reader receives the pairing information from the passive RF device in response to the passive RF device being with a threshold proximity of the RF reader. The first and second communication devices wirelessly connect based on the pairing information, enabling the control device to wirelessly communicate with the surgical console to remotely control the surgical device.

Systems and methods for remotely controlling a surgical instrument of console-based surgical systems
11533764 · 2022-12-20 · ·

A surgical system and a method of operating a surgical system are disclosed herein. The surgical system comprises a surgical console, a control device, and a dongle. The surgical console operates a surgical device and comprises a connection port. The control device communicates with the surgical console to remotely control the surgical device. The dongle physically couples to the connection port of the surgical console. The control device comprises a first communication device and a radio frequency (RF) reader, and the dongle comprises a second communication device and a passive RF device. The RF reader receives the pairing information from the passive RF device in response to the passive RF device being with a threshold proximity of the RF reader. The first and second communication devices wirelessly connect based on the pairing information, enabling the control device to wirelessly communicate with the surgical console to remotely control the surgical device.

Providing secure communications between computing devices

Embodiments include devices and methods for providing secure communications between a first computing device and a second computing device are disclosed. A processor of the first computing device may determine in a first application software first security key establishment information. The processor may provide the first security key establishment information to a communication layer of the first computing device for transmission to the second computing device. The processor may receive, in the first application software from the communication layer of the first computing device, second security key establishment information received from the second computing device. The processor may determine a first security key by the first application software based at least in part on the second security key establishment information. The processor may provide the first security key to the communication layer for protecting messages from the first application software to the second computing device.