H04W12/047

SECURE KEY EXCHANGE MECHANISM IN A WIRELESS COMMUNICATION SYSTEM
20230209335 · 2023-06-29 · ·

Security features for a wireless communications system including encryption and decryption of communications, secure key exchange, secure pairing, and secure re-pairing are provided. The encryption/decryption mechanism uses AES-256 block cypher with counter mode to generate blocks of cypher bits used to encrypt and decrypt communications between a master and devices. Session keys are generated using a random salt and a counter value. The random salt is generated using a secure random number generator. A master key or device key is also used in generating session keys. Impermanent session keys are used to encrypt/decrypt finite amount of data. Thereafter, the session key is replaced and cypher bits are generated using the new session key. A synchronized key jump procedure ensures that the master and device switch to the new session key at the same time.

Information-theoretically secure secrecy generation

A method and apparatus are provided for performing information-theoretically secure cryptography using joint randomness not shared by others. Two valid communicating entities independently generate samples of a shared source that is not available to an illegitimate entity. The shared source may be a satellite signal, and each legitimate entity may generate uniformly distributed samples from a binary phase-shift keying signal received on an independent channel. Alternatively, the shared source may be a channel between the two legitimate entities, such that each legitimate entity generates samples of unknown distribution based on the channel impulse response of the channel. One legitimate entity generates an encryption key, a quantization error, and a syndrome from its samples. The quantization error and the syndrome are reported to the other legitimate entity. The other legitimate entity generates a matching encryption key using its samples, the quantization error, and the syndrome.

Data processing method and device for safe data communication and processing in IoT environments

A data processing method is provided. A terminal device encrypts a target instruction and a first identifier using a first key to obtain a first ciphertext; and sends the first ciphertext to an IoT device through an IoT platform. The IoT device decrypts the first ciphertext using a second key to obtain the target instruction and the first identifier; determines whether the first identifier matches a second identifier stored locally and comes to a matching result, the first key and the second key being negotiated by the terminal device and the IoT device; and obtains a second cipher text by encrypting the matching result using the second key. The terminal device receives the second ciphertext returned by the IoT device through the IoT platform; decrypts the second ciphertext using the first key to obtain a decryption result; and performs a corresponding operation using the decryption result.

Data sharding for transmission over a high generation cellular network
11258854 · 2022-02-22 · ·

Aspects of the disclosure relate to data sharding for transmission over a high generation cellular network. A computing platform may detect, via a communication network, transmission of data from a first computing device to a second computing device. Subsequently, the computing platform may intercept, prior to receipt of the transmission by the second computing device, the data. Then, the computing platform may shard the data into a first shard and a second shard. Then, the computing platform may identify, within the communication network, a first communication channel and a second communication channel. Then, the computing platform may send, to the second computing device, the first shard via the first communication channel, and the second shard via the second communication channel. Subsequently, the computing platform may merge, the first shard and the second shard, to reconfigure the data.

Secure pairing mechanism in a wireless communication system

A novel and useful mechanism for providing security features to a wireless communications system that otherwise does not have such features. Security features including encryption and decryption of communications, secure key exchange, secure pairing, and secure re-pairing are provided. The invention is applicable to wireless communication systems such as IO-Link Wireless. The encryption/decryption mechanism uses AES-256 block cypher with counter mode to generate blocks of cypher bits used to encrypt and decrypt communications between the master and devices. Session keys are generated using a random salt and a counter value. The random salt is generated using a secure random number generator such as the CSPRNG algorithm. A master key (or device key) is also used in generating session keys. Session keys are not permanent and are used to encrypt/decrypt only a finite amount of data. Once exhausted, the session key is replaced by a new one and cypher bits are generated using the new session key. A synchronized key jump procedure ensures that the master and device switch to the new session key at the same time.

Techniques for securely communicating a data packet via at least one relay user equipment

Techniques are described for wireless communication. A method of wireless communication at a transmitting wireless device includes generating a first Message Authentication Code for a data packet based at least in part on a first security key used to communicate with a receiving wireless device; generating a second message authentication code for the data packet based at least in part on a second security key used to communicate with a relay user equipment (UE), in which the relay UE is included in a data routing path between the transmitting wireless device and the receiving wireless device; and transmitting the data packet to the relay UE with at least the first message authentication code and the second message authentication code.

Techniques for securely communicating a data packet via at least one relay user equipment

Techniques are described for wireless communication. A method of wireless communication at a transmitting wireless device includes generating a first Message Authentication Code for a data packet based at least in part on a first security key used to communicate with a receiving wireless device; generating a second message authentication code for the data packet based at least in part on a second security key used to communicate with a relay user equipment (UE), in which the relay UE is included in a data routing path between the transmitting wireless device and the receiving wireless device; and transmitting the data packet to the relay UE with at least the first message authentication code and the second message authentication code.

LAUNCHER APPLICATION WITH CONNECTIVITY DETECTION FOR SHARED MOBILE DEVICES
20220239573 · 2022-07-28 ·

Disclosed are approaches for a launcher application with connectivity detection for shared mobile devices. In some examples, among others, a management service component, a client device component, an enterprise environment component, or other connectivity endpoints associated with a plurality of applications can be identified. At least one response to requests transmitted to the connectivity endpoints can be received. A mode of connectivity can be determined based on the response. An application which is launchable in the mode of connectivity can be launched in an instance in which a selectable representation for the application is selected in a user interface.

System and method for communicating information about a serviceable item
11206251 · 2021-12-21 · ·

A first electronic device is associated with a serviceable item. The first electronic device includes a user input; an output device; and a control circuit. The first electronic device is configured to identify user interaction with the user input; generate a code unique to the user interaction with the user input; and output, via the output device and to a second electronic device associated with the user, a temporary session identifier comprising the code, the temporary session identifier useable by the second device to establish a communication session with a server. The user may communicate information about the serviceable item to the server over the communication session in an attempt to facilitate servicing of the serviceable item.

VEHICLE, IN-VEHICLE DEVICE, AND MANAGEMENT METHOD
20210377734 · 2021-12-02 ·

A vehicle configured to cancel restriction of at least one function, which includes restriction of a function enabling an actuation of a power unit of the vehicle, by unlock of a first key, the vehicle performing: receiving a registration request of a second key that is an electronic key from a communication terminal by short distance wireless communication, determining, on condition that the vehicle is unlocked by the first key, whether to accept the received registration request, and authenticating the second key concerning the registration request in a case where it is determined to accept the registration request and registering the authenticated second key.