Patent classifications
H04W12/047
Data Sharding for Transmission Over a High Generation Cellular Network
Aspects of the disclosure relate to data sharding for transmission over a high generation cellular network. A computing platform may detect, via a communication network, transmission of data from a first computing device to a second computing device. Subsequently, the computing platform may intercept, prior to receipt of the transmission by the second computing device, the data. Then, the computing platform may shard the data into a first shard and a second shard. Then, the computing platform may identify, within the communication network, a first communication channel and a second communication channel. Then, the computing platform may send, to the second computing device, the first shard via the first communication channel, and the second shard via the second communication channel. Subsequently, the computing platform may merge, the first shard and the second shard, to reconfigure the data.
Apparatus, system, method, and computer-readable recording media for onboarding of a wireless extender in a wireless network
An apparatus, system, method, and computer-readable recording media perform onboarding of a wireless extender in a wireless residential network. A mobile device, obtains a media access point (MAC) address or serial number from a wireless extender, and transmits to a residential gateway a request to add the wireless extender to the wireless residential network. The residential gateway performs a protected onboarding operation that includes transmitting a unique onboarding trigger SSID to the wireless extender, the unique onboarding trigger SSID including an identifier with part or all of the MAC address or the serial number from the wireless extender and being provided as a signal to initiate a standard WPS operation on the wireless extender. The wireless extender initiates the standard WPS operation for establishing a wireless backhaul link between the wireless residential network and the wireless extender.
Storage device, electronic system including storage device, and control program for storage device
In one embodiment, a storage device that is installable in an electronic apparatus includes a first communication interface for connecting the electronic apparatus to the storage device, a nonvolatile memory for storing data and data management table storing a data size and address information for the data stored in the nonvolatile memory, and a processor configured to change at least one piece of data stored in the nonvolatile memory without changing file management information stored in the data management table. The processor is configured to change the stored data without receiving an instruction to do so from the electronic apparatus through the first interface.
Storage device, electronic system including storage device, and control program for storage device
In one embodiment, a storage device that is installable in an electronic apparatus includes a first communication interface for connecting the electronic apparatus to the storage device, a nonvolatile memory for storing data and data management table storing a data size and address information for the data stored in the nonvolatile memory, and a processor configured to change at least one piece of data stored in the nonvolatile memory without changing file management information stored in the data management table. The processor is configured to change the stored data without receiving an instruction to do so from the electronic apparatus through the first interface.
Generating ephemeral key pools for sending and receiving secure communications
A method, system, and non-transitory computer readable medium are described for providing a sender a plurality of ephemeral keys such that a sender and receiver can exchange encrypted communications. Accordingly, a sender may retrieve information, such as a public key and a key identifier, for the first receiver from a local storage. The retrieved information may be used to generate a key-encrypting key that is used to generate a random communication encryption key. The random communication encryption key is used to encrypt a communication, while the key-encrypting key encrypts the random communication key. The encrypted communication and the encrypted random communication key are transmitted to the first receiver.
Generating ephemeral key pools for sending and receiving secure communications
A method, system, and non-transitory computer readable medium are described for providing a sender a plurality of ephemeral keys such that a sender and receiver can exchange encrypted communications. Accordingly, a sender may retrieve information, such as a public key and a key identifier, for the first receiver from a local storage. The retrieved information may be used to generate a key-encrypting key that is used to generate a random communication encryption key. The random communication encryption key is used to encrypt a communication, while the key-encrypting key encrypts the random communication key. The encrypted communication and the encrypted random communication key are transmitted to the first receiver.
Method and apparatus for transmitting router security information
A method for transmitting router security information, applied in a router, includes: transmitting, to a terminal requesting to acquire router security information, a generated link of a local area network for transmitting the router security information; receiving an access request initiated by the terminal through a network address to which the link of the local area network is pointed; and, returning, through the local area network, a response to the access request to the terminal, the response containing encrypted router security information. The encrypted router security information can therefore be transmitted by a local network established for transmitting security information by a router. In this security information transmission mode, the possibility of remotely acquiring router security information is eliminated. Moreover, the situation where the router security information is transmitted on the cloud is also avoided, and the security of privacy information of terminal devices is improved.
RADIO NETWORK NODE, NETWORK NODE AND METHODS FOR SETTING UP A SECURE CONNECTION TO THE USER EQUIPMENT (UE)
Embodiments herein relate to e.g. a method performed by a network node for handling a communication of a user equipment, UE, in a wireless communication network. The network node transmits to a radio network node associated with the UE, a request message indicating a request for capability data for the UE, wherein the request message comprises a security indication, and wherein the security indication indicates data for setting up a secure connection to the UE.
PROVISIONING A SMART DEVICE IN AN EXISTING SECURE NETWORK WITHOUT USING A CLOUD SERVICE
After the establishment of a mesh network (e.g., a Bluetooth mesh network), a smart device (not the original provisioner) may be provisioned to the mesh network by a node of the mesh network, which acts a provisioner. Network keys and other provisioning information may be provided to the smart device from the provisioner node using a standard mesh provisioning process implemented in reverse (i.e., from the node to the smart device). The reverse-implementation of the standard mesh provisioning process does not require cloud services, a sideband channel, or any custom interface service between the smart device and the mesh network. Other methods of provisioning a smart device to a mesh network are also provided, as are other aspects.
Communication Device
A communication device may receive a specific signal from a first external device; after the specific signal has been received from the first external device, cause an output unit of the communication device to output specific information obtained by using a public key; after the specific information has been outputted, receive an authentication request in which the public key is used from the first external device; in a case where the authentication request is received from the first external device, send an authentication response to the first external device; after the authentication response has been sent to the first external device, receive connection information from the first external device; and in a case where the connection information is received from the first external device, establish, by using the connection information, a wireless connection between the communication device and a second external device.