Patent classifications
H04W12/047
Configuring a remote electronic device by a peer electronic device in a networked environment
A method for configuring multiple electronic devices in a batch, is described. The method can include initializing, by a first computing device a communication network based on a pre-defined configuration parameter. The pre-defined configuration parameter is associated with a first instance of an application on the first computing device. Further, the method includes identifying, by the first computing device, an initialization of a second instance of an application at a second computing device. In response to identifying the initialization of the second instance of the application at the second computing device, the method includes, sending, by the first computing device configuration settings for the second computing device over a secured communication network. In this regard, the configuration settings can comprise at least the pre-defined configuration parameter for configuring the second computing device.
DEVICE COMMUNICATION THROUGH HIGH-FREQUENCY LIGHT ENCODING
The embodiments set forth a technique for enabling a computing device to securely communicate with a peripheral computing device. According to some embodiments, the method can include the steps of (1) receiving, at a detection sensor of the computing device, a light signal from the peripheral computing device, wherein the light signal is received at a first frequency that is higher than a second frequency capable of being detected by a camera system of the computing device, (2) extracting information from the light signal, and (3) performing an operation using the information.
LAUNCHER APPLICATION WITH CONNECTIVITY DETECTION FOR SHARED MOBILE DEVICES
Disclosed are approaches for a launcher application with connectivity detection for shared mobile devices. In some examples, among others, a management service component, a client device component, an enterprise environment component, or other connectivity endpoints associated with a plurality of applications can be identified. At least one response to requests transmitted to the connectivity endpoints can be received. A mode of connectivity can be determined based on the response. An application which is launchable in the mode of connectivity can be launched in an instance in which a selectable representation for the application is selected in a user interface.
System and method for securely configuring a new device with network credentials
A system, apparatus, and method for sharing network credentials. One embodiment of a method comprises: establishing a Bluetooth connection between a first Internet of Things (IoT) device and a mobile device of a first user having an IoT app installed, the mobile device to couple the first IoT device to an IoT service; receiving a request from a user from the mobile device to configure the first IoT device using network credentials from a second IoT device, the second IoT device registered with an account of the user on the IoT service and configured to connect to a secure network of the user with the network credentials; establishing a communication channel between the first IoT device and the second IoT device through the IoT service and the mobile device to obtain the network credentials; and using the network credentials at the first IoT device to securely connect to the secure network.
Secure key exchange mechanism in a wireless communication system
Security features for a wireless communications system including encryption and decryption of communications, secure key exchange, secure pairing, and secure re-pairing are provided. The encryption/decryption mechanism uses AES-256 block cypher with counter mode to generate blocks of cypher bits used to encrypt and decrypt communications between a master and devices. Session keys are generated using a random salt and a counter value. The random salt is generated using a secure random number generator. A master key (or device key) is also used in generating session keys. Impermanent session keys are used to encrypt/decrypt finite amount of data. Thereafter, the session key is replaced and cypher bits are generated using the new session key. A synchronized key jump procedure ensures that the master and device switch to the new session key at the same time.
MULTI-LINK WIRELESS COMMUNICATIONS CONNECTIONS
A method includes establishing a multi-link security association between a transmitter upper Media Access Control (MAC) logic entity of a transmitter and a receiver upper MAC logic entity of a receiver. The transmitter includes one or more transmitter links. The receiver includes one or more receiver links.
METHODS, APPARATUS AND SYSTEMS USING VEHICLE-TO-EVERYTHING (V2X) ENHANCEMENTS TO SUPPORT VEHICLE-TO-PEDESTRIAN (V2P) COMMUNICATION
V2X Enhancements to support V2P communication are disclosed. In particular, Vehicle to Pedestrian Communications are provided. Methods and apparatus for operation by an initiating wireless transmit/receive unit (WTRU) for direct link with a peer WTRU using a first key identifier of a root key are provided. In one embodiment, a method includes sending, by the initiating WTRU to the peer WTRU, a release request message to release the direct link with the peer WTRU, the release request message including information indicating first security information associated with a second key identifier of the root key. The method further includes receiving, receiving, by the initiating WTRU from the peer WTRU, a response to the release request message including second security information associated with the second key identifier of the root key. The method also includes determining, by the initiating WTRU, the second key identifier of the root key using the first security information and the second security information; and sending, by the initiating WTRU to the peer WTRU, a message including information indicating the second key identifier of the root key.
METHODS, APPARATUS AND SYSTEMS USING VEHICLE-TO-EVERYTHING (V2X) ENHANCEMENTS TO SUPPORT VEHICLE-TO-PEDESTRIAN (V2P) COMMUNICATION
V2X Enhancements to support V2P communication are disclosed. In particular, Vehicle to Pedestrian Communications are provided. Methods and apparatus for operation by an initiating wireless transmit/receive unit (WTRU) for direct link with a peer WTRU using a first key identifier of a root key are provided. In one embodiment, a method includes sending, by the initiating WTRU to the peer WTRU, a release request message to release the direct link with the peer WTRU, the release request message including information indicating first security information associated with a second key identifier of the root key. The method further includes receiving, receiving, by the initiating WTRU from the peer WTRU, a response to the release request message including second security information associated with the second key identifier of the root key. The method also includes determining, by the initiating WTRU, the second key identifier of the root key using the first security information and the second security information; and sending, by the initiating WTRU to the peer WTRU, a message including information indicating the second key identifier of the root key.
DEVICE AND METHOD FOR TRANSMITTING AND RECEIVING SIGNAL IN WIRELESS COMMUNICATION SYSTEM
An operating method of a first terminal in a wireless communication system, according to an embodiment of the present disclosure, may include transmitting sidelink data to a second terminal through a first radio bearer; reporting a count value to a base station when a certain condition is satisfied; receiving, from the base station, a sidelink radio resource control (RRC) reconfiguration message, based on the count value; generating a second radio bearer based on the RRC reconfiguration message; and transmitting the sidelink data to the second terminal through the second radio bearer.
DEVICE AND METHOD FOR TRANSMITTING AND RECEIVING SIGNAL IN WIRELESS COMMUNICATION SYSTEM
An operating method of a first terminal in a wireless communication system, according to an embodiment of the present disclosure, may include transmitting sidelink data to a second terminal through a first radio bearer; reporting a count value to a base station when a certain condition is satisfied; receiving, from the base station, a sidelink radio resource control (RRC) reconfiguration message, based on the count value; generating a second radio bearer based on the RRC reconfiguration message; and transmitting the sidelink data to the second terminal through the second radio bearer.