Patent classifications
H04W12/50
Processing of Mesh Network Data Packets Having Invalid Cyclic Redundancy Check (CRC) Values
A technique for processing Bluetooth Mesh packets that comprise erroneous cyclic redundancy check (CRC) values. The disclosed mesh node receives packets, each of which comprising a Protocol Data Unit (PDU) and a cyclic redundancy check (CRC) field. The PDU comprises an AD Data field with multiple octets; the AD Data field itself comprises a Network Identifier (NID) field. After determining the value of the CRC field in a first packet to be invalid, and subject to further checks, the mesh node selects a selected set of one or more NID values, based on the validity of the value of the NID field in the first packet. The mesh node then processes at least some of the multiple octets in the AD Data field in the first packet in accordance with a set of network keys that hash to the one or more NID values in the selected set.
Prompt and secure data communication pairing
Prompt and secure data communication paring concepts are described. In one example, a method for data communications includes a client device receiving an advertising packet from a peripheral device, comparing a signal strength indicator for the advertising packet to a threshold, generating a session key based on the comparing, and transmitting the session key to the peripheral device. The method also includes communicating and acknowledging one or more data chunks between the devices through a secure communications channel. The concepts are different that traditional pairing techniques for short-range, low-power wireless data communications in that secure communications channels can be achieved automatically, relatively more quickly, and repeatedly without the need for user intervention. The secure communications channels can be established and reestablished without the need for traditional pairing techniques.
Prompt and secure data communication pairing
Prompt and secure data communication paring concepts are described. In one example, a method for data communications includes a client device receiving an advertising packet from a peripheral device, comparing a signal strength indicator for the advertising packet to a threshold, generating a session key based on the comparing, and transmitting the session key to the peripheral device. The method also includes communicating and acknowledging one or more data chunks between the devices through a secure communications channel. The concepts are different that traditional pairing techniques for short-range, low-power wireless data communications in that secure communications channels can be achieved automatically, relatively more quickly, and repeatedly without the need for user intervention. The secure communications channels can be established and reestablished without the need for traditional pairing techniques.
Electronic device for receiving data packet in Bluetooth network environment and method thereof
An electronic device for receiving data packets in a Bluetooth environment is provided. The electronic device includes a wireless communication circuitry configured to support a Bluetooth protocol. The wireless communication circuitry is configured to establish a first link with a first external electronic device, synchronize a secret key generation scheme with the first external electronic device based on information obtained while establishing the first link, receive page information transmitted from a second external electronic device, based on Bluetooth address information of the first external electronic device, the Bluetooth address information being obtained while establishing the first link, generate a link key used for a second link between the first external electronic device and the second external electronic device, based on the synchronized secret key generation scheme, and receive an encrypted data packet transmitted over the second link from the second external electronic device using the generated link key.
Dynamic MAC address change mechanism for wireless communications
Methods, systems, and devices relate to digital wireless communication, and more specifically, to techniques relating to dynamic change MAC address of the station for subsequent transmissions. In one exemplary aspect, a method of dynamic change MAC address includes specifying a MAC address change mode and a new MAC address to be used by the station. In another exemplary aspect, a method of dual MAC address change mode in the dynamic change MAC address mechanism includes separating the unchanged MAC address of the station from the changeable MAC address of the station, and keep the mapping between them. In another exemplary aspect, a method includes transmitting a MAC address change request message from the station (or the access point) to initiate the MAC address change procedure. In another exemplary aspect, a method includes receiving a MAC address change response message from the access point (or the station).
Apparatus and Methods for Encrypted Communication
A communication system including a first device (1a, 1a′) and a second device (1b, 1b′). The first device (1a, 1a′) comprises a memory storing first-device-specific identification data and the second device (1b, 1b′) comprises a memory storing second-device-specific identification data. The first device (1a, 1a′) is configured to receive a copy of the second-device-specific identification data and to store the copy in the memory of the first device (1a, 1a′) and the second device (1b, 1b′) is configured to receive a copy of the first-device-specific identification data and to store the copy in the memory of the second device (1b, 1b′). The first device (1a, 1a′) is configured to derive a first encryption key from the first-device-specific identification data and the received copy of the second-device-specific identification data. The second device is configured to derive the first encryption key from the second-device-specific identification data and the received copy of the first-device-specific identification data. The first device (1a, 1a′) encrypts transmission data using the first encryption key and transmits the encrypted transmission data to the second device (1b, 1b′). The second device (1b, 1b′) receives the encrypted transmission data from the first device (1a, 1a′) and decrypts the encrypted transmission data using the first encryption key.
ELECTRONICS MODULE FOR A WEARABLE ARTICLE
An interface (101) is arranged to communicatively couple with an electronics arrangement of the wearable article so as to receive a signal from the electronics arrangement. A controller (103) is communicatively coupled to the interface (101) and arranged to receive the signal from the interface (101). A power source (105) is coupled to the controller (103) and arranged to supply power to the controller (103). A first antenna (107) is arranged to communicatively couple with a mobile device over a first wireless communication protocol. A second antenna (109) is arranged to communicatively couple with the mobile device over a second wireless communication protocol. In response to the mobile device being brought into proximity with the electronics module (100), the first antenna (107) is triggered to transmit information to the mobile device over the first wireless communication protocol.
ELECTRONICS MODULE FOR A WEARABLE ARTICLE
An interface (101) is arranged to communicatively couple with an electronics arrangement of the wearable article so as to receive a signal from the electronics arrangement. A controller (103) is communicatively coupled to the interface (101) and arranged to receive the signal from the interface (101). A power source (105) is coupled to the controller (103) and arranged to supply power to the controller (103). A first antenna (107) is arranged to communicatively couple with a mobile device over a first wireless communication protocol. A second antenna (109) is arranged to communicatively couple with the mobile device over a second wireless communication protocol. In response to the mobile device being brought into proximity with the electronics module (100), the first antenna (107) is triggered to transmit information to the mobile device over the first wireless communication protocol.
TERMINAL DEVICE VERIFICATION METHOD AND APPARATUS
A terminal device verification method and an apparatus are provided. The method includes: A first network device receives a first message from a first terminal device. Then, the first network device verifies a pairing relationship between the first terminal device and a second terminal device. After the verification on the pairing relationship between the first terminal device and the second terminal device succeeds, the first network device sends a second message to the first terminal device, where the second message include first indication information, and the first indication information is used to indicate a pairing result of the first terminal device and the second terminal device. The pairing relationship between the first terminal device and the second terminal device is verified, so that the first terminal device and the second terminal device can be securely paired, to improve use security of the first terminal device and the second terminal device.
TERMINAL DEVICE VERIFICATION METHOD AND APPARATUS
A terminal device verification method and an apparatus are provided. The method includes: A first network device receives a first message from a first terminal device. Then, the first network device verifies a pairing relationship between the first terminal device and a second terminal device. After the verification on the pairing relationship between the first terminal device and the second terminal device succeeds, the first network device sends a second message to the first terminal device, where the second message include first indication information, and the first indication information is used to indicate a pairing result of the first terminal device and the second terminal device. The pairing relationship between the first terminal device and the second terminal device is verified, so that the first terminal device and the second terminal device can be securely paired, to improve use security of the first terminal device and the second terminal device.