H04W12/043

Radio communication system and radio communication method

eNB (100A) notifies gNB (100B) of a setting location that indicates whether to set in the eNB (100A) or the gNB (100B) a PDCP entity that is a packet data convergence protocol layer entity to be used in a split bearer. The gNB (100B) sets a protocol stack to be used in the split bearer based on the setting location of the PDCP entity notified from the eNB (100A).

System and method of acquiring network-centric information for customer premises equipment (CPE) management

A method, device, and computer-readable medium are provided for sending, by a customer-premises equipment (CPE) device to a wireless access device via a CPE network interface, an Internet protocol (IP) address lease request, wherein the wireless access device terminates a wireless backhaul connection to a service provider network; receiving, responsive to the IP address lease request, an acknowledge message that includes a requested IP address and a protocol configuration option (PCO) providing identification information for the wireless access device; connecting, via the wireless access device and using the requested IP address, to a bootstrap server device associated with the service provider network; receiving, via the wireless access device, attachment information associated with a network management server and the service provider network; and sending, via the wireless access device, the identification information to the network management server in an attachment procedure using the attachment information.

CREDENTIAL BOOTSTRAPPING
20220385483 · 2022-12-01 ·

A device can establish operational credentials for enabling the device to provide an attestation of the device's identity to another party, by performing a method comprising: obtaining bootstrap credentials from a hardware secure element or a trusted execution environment (TEE) of the device; using the bootstrap credentials to establish a secure session with an enrolment server; and via the secure session, establishing the operational credentials with the enrolment server.

Sending verification password responsive to mobile device proximity
11509648 · 2022-11-22 · ·

A method includes detecting proximity between a mobile device and a remote device associated with a transaction reserved by a user of the mobile device and a mode of the electronic device. A verification password is sent to the remote device responsive to detecting the proximity and the mode. A device includes a module to detect proximity between the device and a remote device associated with a transaction reserved by a user of the device occurring within a predefined distance threshold and a processor coupled to the module. A device includes another module to detect a stationary mode of the electronic device occurring for at least a predefined duration threshold. The processor is sends a verification password to the remote device responsive to detecting the proximity and the mode.

Key Change Notification for Authentication and Key Management for Applications

A method performed by a first network node includes transmitting a first subscription request message indicating a request to subscribe to receive notification of changes in an authentication status of a wireless device. A first notification message is received. The first notification message includes an indication of a change in the authentication status of the wireless device.

Key Change Notification for Authentication and Key Management for Applications

A method performed by a first network node includes transmitting a first subscription request message indicating a request to subscribe to receive notification of changes in an authentication status of a wireless device. A first notification message is received. The first notification message includes an indication of a change in the authentication status of the wireless device.

OBTAINING DEVICE POSTURE OF A THIRD PARTY MANAGED DEVICE
20230054097 · 2023-02-23 ·

Techniques are disclosed to obtain device posture of a third party managed device. In various embodiments, a unique identifier of the third party managed device is embedded in a registration communication sent from a third party managed device to an access node associated with a first party management entity. The registration communication is sent from the third party managed device to the access node. The access node is configured to store data associating the unique identifier with the third party managed device, and to use the unique identifier to obtain from the third party management entity device posture information for the third party managed device.

METHOD OF SECURE AND AUTOMATED BOOTSTRAPPING ON KEYS AND CERTIFICATES FOR V2X ENVIRONMENT AND DEVICE THEREOF

A device for secure and automated enrollment-certificate bootstrapping on keys and certificates for a vehicle to everything (V2X) environment of a V2X end entity in a security credential management system (SCMS) for V2X communication, the device comprising: a processor; and a memory configured to store at least one instruction to be performed by the processor, the at least one instruction is configured to instruct the processor to perform steps of: by a secure bootstrapping service (SBS) agent, checking, for an SSB server, configuration information; by the SBS agent, making a request for bootstrapping data to the SBS server; and by the SBS agent, installing the bootstrapping data in the SBS server.

SECURED SEAMLESS AUTHENTICATION FOR BLUETOOTH JUST WORKS PAIRING
20220369109 · 2022-11-17 ·

In a vehicle, an authentication key may be transmitted by a mobile device to an automotive head unit over a first Bluetooth® link (securely-paired), then provided by the automotive head unit to a connectivity extension unit. The authentication key may also be transmitted by the mobile device to the connectivity extension unit over a second Bluetooth® link (not securely-paired). If the authentication key from the automotive head unit matches the authentication key from the mobile device, the connectivity extension unit may perform a transformation on the authentication key to generate a transformed key and transmit it to the mobile device over the second Bluetooth® link. The mobile device may perform the same transformation on its copy of the authentication key, and may compare the resulting transformed key to the transformed key from the connectivity extension unit. If the transformed keys match, the second Bluetooth® link may be verified as secure.

COMMUNICATION NETWORK NODE, USER EQUIPMENT, COMMUNICATION NETWORK, METHOD
20230036353 · 2023-02-02 · ·

The present disclosure generally pertains to a communication network node having circuitry configured to: request a home mobility service provider to allow a roaming mobility service for a passenger which is located in a mobility service area of a roaming mobility service provider.