Patent classifications
H04W12/069
Method for communicating with external electronic apparatus and electronic apparatus thereof
An electronic device and method are disclosed herein. The electronic device includes memory storing a certificate list including first certificate data of the electronic device, and second certificate data of an external electronic device, a short-range wireless communication circuit, and a processor. The processor implements the method, including: detecting a trigger event for requesting establishment a communication connection with a device local to the electronic device, controlling the short-range wireless communication circuit to broadcast an advertisement packet generated based on the first certificate data, in response to detecting the trigger event, receiving a response packet from the external electronic device and acquire a third certificate data from the received response packet, authenticating the external electronic device based on the second certificate data and the third certificate data, and establishing a secure communication channel with the external electronic device if the external electronic device is authenticated.
Method for communicating with external electronic apparatus and electronic apparatus thereof
An electronic device and method are disclosed herein. The electronic device includes memory storing a certificate list including first certificate data of the electronic device, and second certificate data of an external electronic device, a short-range wireless communication circuit, and a processor. The processor implements the method, including: detecting a trigger event for requesting establishment a communication connection with a device local to the electronic device, controlling the short-range wireless communication circuit to broadcast an advertisement packet generated based on the first certificate data, in response to detecting the trigger event, receiving a response packet from the external electronic device and acquire a third certificate data from the received response packet, authenticating the external electronic device based on the second certificate data and the third certificate data, and establishing a secure communication channel with the external electronic device if the external electronic device is authenticated.
System for identification of secure wireless network access points using cryptographic pre-shared keys
A system is provided for identification of secure wireless network access points using cryptographic pre-shared keys. In particular, the system may comprise a client-side application that may use a pre-shared key to generate a list of valid access point ID's in a pseudorandom manner. A server-side application may use the same pre-shared key to generate one or more access point ID's. Based on the pre-shared key, a client computing device may readily identify which wireless access points within the network are secure and trusted.
System for identification of secure wireless network access points using cryptographic pre-shared keys
A system is provided for identification of secure wireless network access points using cryptographic pre-shared keys. In particular, the system may comprise a client-side application that may use a pre-shared key to generate a list of valid access point ID's in a pseudorandom manner. A server-side application may use the same pre-shared key to generate one or more access point ID's. Based on the pre-shared key, a client computing device may readily identify which wireless access points within the network are secure and trusted.
WTRU-TO-NETWORK RELAY
Systems and methods are described herein for enabling discovery and selection of a WTRU-to-network relay by a remote WTRU and handling a WTRU-to-network relay configuration update. The WTRU-to-network relay may broadcast a service type indicating that the service type is available or conditionally available based on the WTRU-to-network relay slicing configuration. The WTRU-to-network relay may update broadcasting the service type or the indication that the service type as being conditionally available based on update of the WTRU-to-network relay slicing configuration. The WTRU-to-network relay may relay traffic between one or more distinct remote WTRUs and the core network node via a WTRU-to-network relay. The WTRU-to-network relay may reuse an existing PDU session for relay traffic or send a PDU session establishment request to network with the requested PDU session parameters depending on if the session parameters associated with an existing PDU session match the PDU session requirements of the remote WTRU.
WTRU-TO-NETWORK RELAY
Systems and methods are described herein for enabling discovery and selection of a WTRU-to-network relay by a remote WTRU and handling a WTRU-to-network relay configuration update. The WTRU-to-network relay may broadcast a service type indicating that the service type is available or conditionally available based on the WTRU-to-network relay slicing configuration. The WTRU-to-network relay may update broadcasting the service type or the indication that the service type as being conditionally available based on update of the WTRU-to-network relay slicing configuration. The WTRU-to-network relay may relay traffic between one or more distinct remote WTRUs and the core network node via a WTRU-to-network relay. The WTRU-to-network relay may reuse an existing PDU session for relay traffic or send a PDU session establishment request to network with the requested PDU session parameters depending on if the session parameters associated with an existing PDU session match the PDU session requirements of the remote WTRU.
SECURITY TAG
A security tag can prohibit unauthorized usage of a device or product. The device may include an electronic nicotine delivery systems (“ENDS”) device, which may include aerosol delivery devices such as smoking articles that produce aerosol. The security tag can prevent usage until authorized. Attempts at usage without authorization can result in the device being unusable. The authorization may include identity confirmation or age verification.
MACHINE TO MACHINE COMMUNICATION ACCELERATION VIA ENCRYPTION BYPASS
The disclosed technology provides systems and methods for accelerating communication for low latency, high reliability, and secure machine control systems through encryption bypass. Machine controllers, e.g., drone, robot, or autonomous-vehicle controllers, establish a hardware-based trust relationship with the controlled machines allowing for the communication of unencrypted low-latency control and data messages, for example, via ultra-reliable low latency (URLLC) cellular network slices. The machines can relay non-mission-critical communications via encrypted communication using different network slices. The machines can also use distributed ledgers to store and access events and records used to create and/or maintain the trust relationship, and archive data for subsequent use.
MACHINE TO MACHINE COMMUNICATION ACCELERATION VIA ENCRYPTION BYPASS
The disclosed technology provides systems and methods for accelerating communication for low latency, high reliability, and secure machine control systems through encryption bypass. Machine controllers, e.g., drone, robot, or autonomous-vehicle controllers, establish a hardware-based trust relationship with the controlled machines allowing for the communication of unencrypted low-latency control and data messages, for example, via ultra-reliable low latency (URLLC) cellular network slices. The machines can relay non-mission-critical communications via encrypted communication using different network slices. The machines can also use distributed ledgers to store and access events and records used to create and/or maintain the trust relationship, and archive data for subsequent use.
Methods and Electronic Devices for Verifying Device Identity During Secure Pairing
An electronic device includes a first communication device operable across a first medium of communication and a second communication device operable across a second medium of communication that is different from the first medium of communication. One or more processors operable with the first communication device and the second communication device obtain a client certificate digest from a prospective client device using the first communication device. Thereafter, the one or more processors receive a client certificate from a remote electronic device using the second communication device. The one or more processors then verifying that the prospective client device and the remote electronic device are the same device prior to establishing a secure communication session.