H04W12/047

Configuration system, client device, embedded device configuration method, and storage medium

The present disclosure discloses a configuration system, comprising: a client device, an embedded device, and a router. The client device is configured to establish a first connection with the embedded device in a point-to-point wireless connection mode, acquire access information of the router, and send the access information to the embedded device. The embedded device is configured to establish, according to the access information, a second connection with the router in a Wi-Fi mode while maintaining the first connection with the client device. The present disclosure also discloses a client device, an embedded device configuration method, and a computer readable storage medium.

Secure Communication Encryption And Decryption Mechanism In A Wireless Communication System
20220264291 · 2022-08-18 · ·

A method of secure communications between a master and a plurality of devices in a wireless communications network, the method comprising: encrypting, on said master, downlink plaintext for multicast transmission to a plurality of devices over a wireless communications link utilizing a symmetric key encryption algorithm in accordance with a first counter value and a shared symmetric session key; and decrypting, on one of said devices, multicast downlink cyphertext received from said master over said wireless communications link utilizing a symmetric key decryption algorithm in accordance with a second counter value and said shared symmetric session key; wherein said wireless communications link is a short distance wireless link in that said master and said plurality of downlink devices are located within a single industrial complex.

Key information generation system and key information generation method

This key information generation system generates key information necessary when using a shared device and imparts this key information to a mobile terminal. Authentication is performed between a mobile terminal which has imported key information, and an authentication device provided to the device, and if said authentication is successful, the mobile terminal enables operation of the device via the authentication device. The key information generation system includes: an information management unit which manages, by associating with one another, individual information for the authentication device, a key information generating code, and usage information pertaining to the use of the authentication device; and a key information generation unit which specifies a key information generation code from the individual information and usage information managed by being associated with one another by the information management unit, and generates key information on the basis of the key information generation code.

WIRELESS COMMUNICATION APPARATUS, METHOD OF CONTROLLING THE APPARATUS, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
20220256540 · 2022-08-11 ·

There is provided a wireless communication apparatus that is able to perform a first wireless communication and a second wireless communication, the second wireless communication having power consumption lower than that of the first wireless communication. The wireless communication apparatus receives, from another wireless communication apparatus through the second wireless communication, information indicating a channel which the another wireless communication apparatus is able to use in the first wireless communication, selects a communication parameter to be provided to the another wireless communication apparatus based on the received information, the communication parameter being required by the another wireless communication apparatus to connect to an apparatus that forms a network in which the first wireless communication occurs; and transmits the selected communication parameter to the another wireless communication apparatus through the first wireless communication.

Systems and methods of electronic lock control and audit

Various embodiments herein each include at least one of systems methods, software, and data structures for electronic lock control and audit. The various embodiments, although widely applicable, are well suited for retail use where higher-value and access-controlled merchandise is stored in locked cages, closets, rooms, and cabinets to prevent theft. One method embodiment includes receiving, via a network from a mobile device app, an unlock request including an employee identifier and a lock identifier to unlock a secured resource of the lock identifier. The method proceeds in processing the request by validating the employee identifier is authorized to unlock the lock of the lock identifier at a current date and time and retrieving a key-code that will unlock the lock of the lock identifier. The method then proceeds with transmitting the key-code to the mobile device app to enable unlocking of the lock.

Systems and methods of electronic lock control and audit

Various embodiments herein each include at least one of systems methods, software, and data structures for electronic lock control and audit. The various embodiments, although widely applicable, are well suited for retail use where higher-value and access-controlled merchandise is stored in locked cages, closets, rooms, and cabinets to prevent theft. One method embodiment includes receiving, via a network from a mobile device app, an unlock request including an employee identifier and a lock identifier to unlock a secured resource of the lock identifier. The method proceeds in processing the request by validating the employee identifier is authorized to unlock the lock of the lock identifier at a current date and time and retrieving a key-code that will unlock the lock of the lock identifier. The method then proceeds with transmitting the key-code to the mobile device app to enable unlocking of the lock.

System And Method To Improve Encrypted Transmissions Between Nodes
20220217541 · 2022-07-07 ·

Systems and methods for improving encrypted transmissions between nodes in a network are disclosed. In one embodiment, two sets of nonce values are used to monitor communications between each pair of network devices, wherein one set of nonce values is used for packets transmitted from a first node to a second node, and the second set of nonce values is used for packets transmitted from the second node to the first node. These nonce values are used to encrypt packets transmitted between the two nodes. In this way, the probability of loss of synchronization may be reduced, especially in configurations where there is an intermediate node between the first node and the second node. In another embodiment, the possibility of a delay attack is minimized by the intentional resetting of security parameters.

Bluetooth network and network configuration method

The invention discloses a method for network configuration via Bluetooth, the method comprising: a Bluetooth communication device establishing a connection to a mobile terminal via Bluetooth; the Bluetooth communication device and the mobile terminal negotiating to determine a data encryption mode and a shared key for data decryption; connecting the Bluetooth communication device to an external wireless network; configuring the wireless network via Bluetooth is realized. According to the invention, during the process of network configuration via Bluetooth, a symmetric encryption method is utilized as the encryption mode for message data, and an asymmetric encryption method is utilized to generate the corresponding shared key, ensuring the data security during network configuration via Bluetooth and network communication processes.

Node apparatus in a network, control method thereof, and storage medium for control of paging policy
11304050 · 2022-04-12 · ·

An MEC node, by analyzing signaling information transmitted between each of a plurality of eNBs and an MME, collects at least one of information indicating a mobility state and information indicating a communication state of a UE present within cells of the plurality of base stations. The MEC node decides a paging range based on the information collected as above upon receiving a paging message for paging the UE, the paging message having been transmitted by MME to one or more eNBs in accordance with a predetermined paging policy. The MEC node transmits a paging message for paging the UE to each eNB present in the decided paging range.

Data Sharding for Transmission over a High Generation Cellular Network
20220109725 · 2022-04-07 ·

Aspects of the disclosure relate to data sharding for transmission over a high generation cellular network. A computing platform may detect, via a communication network, transmission of data from a first computing device to a second computing device. Subsequently, the computing platform may intercept, prior to receipt of the transmission by the second computing device, the data. Then, the computing platform may shard the data into a first shard and a second shard. Then, the computing platform may identify, within the communication network, a first communication channel and a second communication channel. Then, the computing platform may send, to the second computing device, the first shard via the first communication channel, and the second shard via the second communication channel. Subsequently, the computing platform may merge, the first shard and the second shard, to reconfigure the data.