H04W12/069

Methods and Electronic Devices for Verifying Device Identity During Secure Pairing
20230023647 · 2023-01-26 ·

An electronic device includes a first communication device operable across a first medium of communication and a second communication device operable across a second medium of communication that is different from the first medium of communication. One or more processors operable with the first communication device and the second communication device obtain a client certificate digest from a prospective client device using the first communication device. Thereafter, the one or more processors receive a client certificate from a remote electronic device using the second communication device. The one or more processors then verifying that the prospective client device and the remote electronic device are the same device prior to establishing a secure communication session.

SYSTEM FOR IDENTIFICATION OF SECURE WIRELESS NETWORK ACCESS POINTS USING CRYPTOGRAPHIC PRE-SHARED KEYS
20230023649 · 2023-01-26 · ·

A system is provided for identification of secure wireless network access points using cryptographic pre-shared keys. In particular, the system may comprise a client-side application that may use a pre-shared key to generate a list of valid access point ID's in a pseudorandom manner. A server-side application may use the same pre-shared key to generate one or more access point ID's. Based on the pre-shared key, a client computing device may readily identify which wireless access points within the network are secure and trusted.

SYSTEM FOR IDENTIFICATION OF SECURE WIRELESS NETWORK ACCESS POINTS USING CRYPTOGRAPHIC PRE-SHARED KEYS
20230023649 · 2023-01-26 · ·

A system is provided for identification of secure wireless network access points using cryptographic pre-shared keys. In particular, the system may comprise a client-side application that may use a pre-shared key to generate a list of valid access point ID's in a pseudorandom manner. A server-side application may use the same pre-shared key to generate one or more access point ID's. Based on the pre-shared key, a client computing device may readily identify which wireless access points within the network are secure and trusted.

Wi-Fi networks with multiple party control and management

Systems and methods of managing a plurality of Wi-Fi networks via a cloud service include communicating to a plurality of access points in the plurality of Wi-Fi networks, wherein the plurality of access points are deployed in a location that includes any of a multi-dwelling unit (MDU), office space, retail space, mixed-use space, and common areas; providing end user management access to a plurality of end users each associated with one of the plurality of Wi-Fi networks; providing property manager management access to a property manager associated with the location and with any additional locations; and providing service provider management access to a service provider associated with the location.

METHOD AND APPARATUS FOR AUTHENTICATING AND AUTHORIZING NETWORK FUNCTION IN MOBILE COMMUNICATION SYSTEM
20230027515 · 2023-01-26 ·

The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Provided is a method by which a network function (NF) service consumer entity operates in a wireless communication system. The method by which the NF service consumer entity operates includes transmitting, to a service communication proxy (SCP) entity, a service request message including at least one of a client credentials assertion (CCA) credential of the NF service consumer entity, or information related to an NF service producer entity, receiving, from the SCP entity, a service response message, wherein the service response message generated by the NF service producer entity is forwarded by the SCP entity to the NF service consumer entity, and authenticating the NF service producer entity based on the service response message.

SECURELY VERIFYING PROTECTED DEVICES
20230024751 · 2023-01-26 ·

One or more computing devices, systems, and/or methods for securely verifying devices such as protected are provided. A code may be generated for a first device. A short message service (SMS) message comprising the code may be transmitted to the first device at a mobile directory number of the first device. An entry may be created to associate the code with the mobile directory number. A determination may be made as to whether a first code within a message associated with the mobile directory number matches the code within the entry. In response to a match, the message may be processed and a status of the first device may be marked as valid, otherwise, the message may be rejected.

Method and Apparatus for Critical Control Message Transfer Across Networks
20230231849 · 2023-07-20 ·

A network device of a network may generate a network information container including information to be sent to a communication device. The network is a home network of the communication device that is served by a visited network. The network information container may be integrity protected and/or cipher protected. The network device may send, to the communication device via the visited network, a message including the network information container and a credential indicator indicating a type of credential used to protect the network information container. The type of credential may be a 3GPP or non-3GPP credential. The communication device may verify the network information container using one or more security parameters based on the type of credential, and obtain the information in the network information container when the verification succeeds, or discard the network information container when the verification fails.

METHOD FOR ANONYMIZING MOVEMENT DATA
20230229807 · 2023-07-20 ·

A method for anonymizing movement data of road users equipped with a position detection device involves collecting movement data in the form of individual time- and position-related data records and transmitting the collected movement data to a backend server. At least some data records are transmitted indirectly via at least one other vehicle, or the position or time reference in at least some data records is made noisy prior to the transmission.

METHOD FOR ANONYMIZING MOVEMENT DATA
20230229807 · 2023-07-20 ·

A method for anonymizing movement data of road users equipped with a position detection device involves collecting movement data in the form of individual time- and position-related data records and transmitting the collected movement data to a backend server. At least some data records are transmitted indirectly via at least one other vehicle, or the position or time reference in at least some data records is made noisy prior to the transmission.

METHOD AND APPARATUS FOR ESTABLISHING SECURE COMMUNICATION
20230232228 · 2023-07-20 · ·

A method and an apparatus for establishing secure communication. The method includes: a terminal device receives a first message from a first network element, where the first message includes an identifier of a second network element and first indication information, and the first indication information indicates a candidate authentication mechanism associated with the second network element. The terminal device establishes a communication connection with the second network element based on the candidate authentication mechanism. The terminal device may obtain an authentication mechanism of the dynamically configured second network element, to meet a requirement for establishing a secure communication connection through authentication in an MEC architecture.