H04W40/005

Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card
20210351923 · 2021-11-11 ·

A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.

Solar-powered access point for load balancing network traffic across backhaul networks
11172423 · 2021-11-09 · ·

A solar-powered device (SPD) node operates as an access point for leaf nodes. The SPD node load balances network traffic received from leaf nodes across different backhaul networks. The SPD node determines a specific backhaul network across which to route the network traffic based on several different factors associated with the SPD node. Those factors include a current battery level, a current solar generation rate, and a current communication link status. The SPD access point also determines the specific backhaul network across which to route the network traffic based on characteristics of the different backhaul networks, including a network latency, among other characteristics.

Network watermark
11785045 · 2023-10-10 · ·

A network communications method utilizing a network watermark for providing security in the communications includes creating a verifiable network communications path of nodes through a network for the transfer of information from a first end node to a second end node; verifying the network communications path of nodes, by the first end node, before communicating by the first end node information intended for receipt by the second end node; and once the network communications path of nodes is verified by the first end node, communicating by the first end node, via the verified communications path of nodes, the information intended for receipt by the second end node; wherein the network watermark represents the verifiable network communications path of nodes.

Mesh networking using peer to peer messages for a hospitality entity

A method and system for communicating with wireless messaging enabled door locks. The method includes advertising availability of the door lock via wireless messaging for a first period of time; triggering a message send event; determining a destination node; connecting to the destination node; sending the message to the destination node; and entering a low power state for a second period of time, wherein the second period of time is longer than the first period of time; wherein the destination node is chosen from a second door lock or a computing system.

Wake-up radio systems and methods based on backscatter wake-up radio

Provided are wake-up radio systems and methods based on backscatter wake-up radio. The wake-up radio method based on backscatter wake-up radio includes setting an arbitrary receiving window period in a window setting period by receiving a beacon signal from a data collection apparatus, transmitting a backscatter response message to the data collection apparatus based on a reception time of a contention signal received from the data collection apparatus in the set receiving window period, in the window setting period, and receiving a wake-up signal from the data collection apparatus in the data transmission period to set as a wake-up period and transmitting data to the data collection apparatus based on a scheduling time according to a backscatter response message.

A METHOD FOR ESTABLISHING A WIRELESS COMMUNICATION SYSTEM IN A HIGH-VOLTAGE POWER CONVERTER STATION AND A HIGH-VOLTAGE POWER CONVERTER STATION

A method for establishing a wireless communication system in a high-voltage power converter station is provided. The high-voltage power converter station includes a plurality of power devices. The wireless communication system includes a plurality of wireless communication devices, some of which are associated with a power device such that a power device and a wireless communication device together form a wireless power electronic module. The high-voltage power converter station further comprises at least one wireless networking device for providing a communication interface between the plurality of wireless communication devices and a controller configured to control the power devices. The controller determines at least one communication path providing a signal quality above a threshold based on indications of signal quality for a plurality of channels established either between a wireless networking device and a wireless power electronic module or between a wireless communication device and a wireless power electronic module.

Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card
20230379148 · 2023-11-23 ·

A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.

Bluetooth data forwarding

A Bluetooth (BT) device includes a host processor and a BT controller coupled by a Host Controller Interface (HCI) including a Host Controller Transport Layer and a HCI Driver. The host processor implements an applications layer and includes HCI firmware for communicating via the Host Controller Transport Layer with the BT controller. The BT controller includes a processor coupled to a memory and to a transceiver, and a RF driver. The HCI firmware also includes HCI command code for a user to define a topology of the BT network including configuring the BT device in a current chain including a plurality of BT devices including configuring from which BT device it receives data from and which BT device it forwards data to. For communicating data across the BT network the BT device forwards the data without host processor involvement in at least resending the data back to its BT controller.

Methods and apparatus for detecting a voice command

According to some aspects, a method of monitoring an acoustic environment of a mobile device, at least one computer readable medium encoded with instructions that, when executed, perform such a method and/or a mobile device configured to perform such a method is provided. The method comprises receiving acoustic input from the environment of the mobile device while the mobile device is operating in the low power mode, detecting whether the acoustic input includes a voice command based on performing a plurality of processing stages on the acoustic input, wherein at least one of the plurality of processing stages is performed while the mobile device is operating in the low power mode, and using at least one contextual cue to assist in detecting whether the acoustic input includes a voice command.

Set of servers for “machine-to-machine” communications using public key infrastructure
11283603 · 2022-03-22 · ·

A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the Internet to communicate with a module using a module identity, (i) receive server instructions, and (iii) send module instructions. Data can be encrypted and decrypted using a set of cryptographic algorithms and a set of cryptographic parameters. The set of servers can (i) receive a module public key with a module identity, (ii) authenticate the module public key, and (iii) receive a subsequent series of module public keys derived by the module with a module identity. The application interface can use a first server private key and the module controller can use a second server private key.