Patent classifications
H04W12/037
Encryption key exchange process using access device
Encryption key exchange processes are disclosed. A disclosed method includes initiating communication between a portable communication device including a token and a first limited use encryption key, and an access device. After communication is initiated, the portable communication device receives a second limited use key from a remote server via the access device. The portable communication device then replaces the first limited use key with the second limited use key. The second limited use key is thereafter used to create access data such as cryptograms that can be used to conduct access transactions.
Encryption key exchange process using access device
Encryption key exchange processes are disclosed. A disclosed method includes initiating communication between a portable communication device including a token and a first limited use encryption key, and an access device. After communication is initiated, the portable communication device receives a second limited use key from a remote server via the access device. The portable communication device then replaces the first limited use key with the second limited use key. The second limited use key is thereafter used to create access data such as cryptograms that can be used to conduct access transactions.
SYSTEM FOR CONTROLLING LOGISTICS TRANSFORMATION AND METHOD FOR THE SAME
A system and a method for controlling logistics transportation includes a control server to transmit position information of a trailer to an autonomous tractor, and a trailer managing device to receive information on an identification of the autonomous tractor from the control server and to open a door of a warehouse corresponding to the position information of the trailer, when information on an identification of an autonomous tractor, which is extracted from a surrounding image of the warehouse corresponding to the position information of the trailer is matched with the received information on the identification of the autonomous tractor.
SYSTEM FOR CONTROLLING LOGISTICS TRANSFORMATION AND METHOD FOR THE SAME
A system and a method for controlling logistics transportation includes a control server to transmit position information of a trailer to an autonomous tractor, and a trailer managing device to receive information on an identification of the autonomous tractor from the control server and to open a door of a warehouse corresponding to the position information of the trailer, when information on an identification of an autonomous tractor, which is extracted from a surrounding image of the warehouse corresponding to the position information of the trailer is matched with the received information on the identification of the autonomous tractor.
MULTI-PLMN MUSIM FOR TELECOMMUNICATION SYSTEMS
There is provided an apparatus, said apparatus comprising at least one processor and at least one memory including a computer program code, the at least one memory and computer program code configured to, with the at least one processor, cause the apparatus at least to: at a user equipment, the user equipment having a first universal subscriber identity module, USIM, associated with a first network and at least one second USIM associated with a second network, provide an indication from the at least one second USIM to the second network that paging notifications for the second network are to be provided to the first USIM of the user equipment via the first network, receive a paging notification for the second network at the first USIM of the user equipment via the first network and provide the paging notification from the first USIM to the second USIM in the user equipment.
Method and Apparatus for Critical Control Message Transfer Across Networks
A network device of a network may generate a network information container including information to be sent to a communication device. The network is a home network of the communication device that is served by a visited network. The network information container may be integrity protected and/or cipher protected. The network device may send, to the communication device via the visited network, a message including the network information container and a credential indicator indicating a type of credential used to protect the network information container. The type of credential may be a 3GPP or non-3GPP credential. The communication device may verify the network information container using one or more security parameters based on the type of credential, and obtain the information in the network information container when the verification succeeds, or discard the network information container when the verification fails.
RRC connection resume method and apparatus
This application provides an RRC connection resume method and apparatus. In the method, when a terminal moves to a target base station, the target base station may reselect, based on a capability and a requirement of the target base station, a first encryption algorithm and a first integrity protection algorithm that are used when the target base station communicates with the terminal, and send the first encryption algorithm and the first integrity protection algorithm to the terminal. On one hand, a security algorithm used for communication between the terminal and the target base station is flexibly selected. On the other hand, because the base station connected to the terminal changes, communication security can be improved by using a new encryption algorithm and integrity protection algorithm.
RRC connection resume method and apparatus
This application provides an RRC connection resume method and apparatus. In the method, when a terminal moves to a target base station, the target base station may reselect, based on a capability and a requirement of the target base station, a first encryption algorithm and a first integrity protection algorithm that are used when the target base station communicates with the terminal, and send the first encryption algorithm and the first integrity protection algorithm to the terminal. On one hand, a security algorithm used for communication between the terminal and the target base station is flexibly selected. On the other hand, because the base station connected to the terminal changes, communication security can be improved by using a new encryption algorithm and integrity protection algorithm.
Integrity protection for a packet data unit
Apparatuses, methods, and systems are disclosed for integrity protection for a packet data unit. One method includes determining a first portion of a packet data unit, wherein the packet data unit includes the first portion and a second portion. The method includes applying an integrity protection function to the first portion of the packet data unit to result in an integrity protection indicator without applying the integrity protection function to the second portion of the packet data unit. The method includes transmitting the packet data unit with the integrity protection indicator.
Wireless communication terminal, access point, wireless communication system, wireless communication method, and recording medium
In a wireless communication terminal, a control circuit is configured to cause a wireless communicator to wirelessly connect to a first AP on the basis of authentication information of the first AP stored on a memory and is configured to execute authentication processing with the first AP on the basis of the authentication information of the first AP stored on the memory without executing setup processing when the control circuit selects a first mode. The control circuit is configured to start the setup processing with a second AP by using the wireless communicator when the control circuit selects the second mode. The control circuit is configured to cause the wireless communicator to wirelessly connect to the second AP and is configured to execute the authentication processing with the second AP on the basis of authentication information received from the second AP by the wireless communicator.