H04W40/005

BLUETOOTH DATA FORWARDING
20240048951 · 2024-02-08 ·

A Bluetooth (BT) device includes a host processor and a BT controller coupled by a Host Controller Interface (HCI) including a Host Controller Transport Layer and a HCI Driver. The host processor implements an applications layer and includes HCI firmware for communicating via the Host Controller Transport Layer with the BT controller. The BT controller includes a processor coupled to a memory and to a transceiver, and a RF driver. The HCI firmware also includes HCI command code for a user to define a topology of the BT network including configuring the BT device in a current chain including a plurality of BT devices including configuring from which BT device it receives data from and which BT device it forwards data to. For communicating data across the BT network the BT device forwards the data without host processor involvement in at least resending the data back to its BT controller.

Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
10498530 · 2019-12-03 · ·

Methods and systems are provided for efficient and secure Machine-to-Machine (M2M) between modules and servers. A module can communicate with a server by accessing the Internet, and the module can include a sensor and/or actuator. The module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The module can internally derive pairs of private/public keys using cryptographic algorithms and a set of parameters. A server can use a shared secret key to authenticate the submission of derived public keys with an associated module identity. For the very first submission of a public key derived the module, the shared secret key can comprise a pre-shared secret key which can be loaded into the module using a pre-shared secret key code.

Detection and operation of wake-up receivers with limited range

A mobile device that comprises a main receiver and a wake-up receiver is operated by periodically attempting to receive a first signal that is configured for receipt by the wake-up receiver. For each attempt, a detection result is generated that indicates whether the first signal was received with a signal quality that satisfies a predetermined minimum quality criterion. One or more of the detection results are used as a basis for deciding whether or not the wake-up receiver is within range of an access point. An operation of the mobile device is adjusted in response to a decision that the wake-up receiver is not within range of the access point.

ENHANCED USE OF DEACTIVATED SECONDARY CELL GROUP IN DUAL-RX/DUAL-TX MUSIM OPERATION

Techniques of operating a MUSIM include providing information by a UE connected to a secondary node within a first network having a secondary cell group in a deactivated state to a second network to which the UE is connected, the information indicating that the UE is to be connected to a secondary cell group of a secondary node in the deactivated state. Specifically, the UE may send to the second network a first gap request requesting a first set of schedule gaps for performing measurements relating to the secondary cell group of the first network, the secondary cell group being in the deactivated state.

MANAGEMENT AND SETUP OF ENHANCED MAC-E/ES RESOURCES IN CELL-FACH STATE

A method and apparatus are disclosed to manage the enhanced medium access control-e (MAC-e) and enhanced MAC-es (MAC-es) resources. The method and apparatus comprise configuring an enhanced MAC-e entity in a Node-B for a common enhanced dedicated channel (E-DCH) resource in response to receiving an indication from a radio network controller (RNC), wherein the enhanced MAC-e entity in the Node-B operates with an enhanced MAC-es entity in the RNC.

METHOD FOR CONTROLLING FLOW AND APPARATUS FOR SUPPORTING SAME
20190349813 · 2019-11-14 ·

Disclosed is a method for controlling, by a base station, a flow in a wireless communication system. The method comprises the steps of: transmitting, to a terminal, an indicator indicating that the terminal is to enter an RRC inactive state; requesting a core network to interrupt at least a portion of the flow as the terminal enters the RRC inactive state; receiving uplink data from the terminal in the RRC inactive state; determining, on the basis of the uplink data, whether the terminal should enter an RRC connection state; and transmitting the uplink data to the core network according to the determination result.

Set of servers for “machine-to-machine” communications using public key infrastructure
11973863 · 2024-04-30 · ·

A set of servers can support secure and efficient Machine to Machine communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the Internet to communicate with a module using a module identity, (i) receive server instructions, and (iii) send module instructions. Data can be encrypted and decrypted using a set of cryptographic algorithms and a set of cryptographic parameters. The set of servers can (i) receive a module public key with a module identity, (ii) authenticate the module public key, and (iii) receive a subsequent series of module public keys derived by the module with a module identity. The application interface can use a first server private key and the module controller can use a second server private key.

Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
11973864 · 2024-04-30 · ·

Methods and systems are provided for supporting efficient and secure Machine-to-Machine (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.

User equipment operating mode control

A notification regarding a transition of a User Equipment (UE) from a standby operating mode to an active operating mode is exchanged between a UE and a network element in a communication network. The notification could be an uplink notification that is transmitted by the UE to the network element in response to an operating mode transition criterion for the UE being met at the UE, or a downlink notification that is transmitted by the network element to the UE in response to an operating mode transition criterion for the UE being met at the network element. The UE transitions from the standby operating mode to the active operating mode in response to the operating mode transition criterion being satisfied. The transmitter of the notification, which could be the UE or the network element, could also perform grant-free transmission of data without first receiving a response to the notification.

Single radio serving multiple wireless links

A computing device (such as a computer gaming console) uses only a single radio to concurrently communicate with a wireless network access point and wireless client devices such as game controllers or peripherals. To establish and maintain both a high-throughput link with the access point, and a low-latency link with the client device(s), the single Wi-Fi radio of the computing device is configured to periodically switch between a channel used for the high-throughput link and a different channel that is used for the low-latency linkthus implementing a combination of frequency division multiplexing (FDM) and time division multiplexing (TDM). The console may use aspects of the Wi-Fi protocol standard to ensure that periodically switching its single radio between the two channels is accomplished while maintaining reliable communication on both channels.