H04W12/069

CERTIFICATE BASED APPLICATION DESCRIPTORS FOR NETWORK SLICE SELECTION
20230049987 · 2023-02-16 ·

Various aspects of the present disclosure generally relate to certificate based application descriptors for network slice selection. In some aspects, a user equipment (UE) may receive a first certificate associated with obtaining a network slice for executing an application. The UE may transmit, to a device, a request for the network slice with the first certificate, and receive an indication that the network slice is available to the UE for the application, based at least in part on the request. Numerous other aspects are provided.

PAIRING METHOD APPLIED TO SHORT-RANGE COMMUNICATION SYSTEM AND WIRELESS DEVICE
20230052917 · 2023-02-16 ·

Embodiments of this application disclose a pairing method applied to a short-range communication system and a wireless device in the field of wireless communication. The method includes: obtaining, by a first wireless device, a first password, where the first password is shared by the first wireless device and a second wireless device; and pairing, by the first wireless device, with the second wireless device based on a password-based authenticated key exchange (PAKE) protocol and by using the first password as an encryption password in a key exchange process.

PAIRING METHOD APPLIED TO SHORT-RANGE COMMUNICATION SYSTEM AND WIRELESS DEVICE
20230052917 · 2023-02-16 ·

Embodiments of this application disclose a pairing method applied to a short-range communication system and a wireless device in the field of wireless communication. The method includes: obtaining, by a first wireless device, a first password, where the first password is shared by the first wireless device and a second wireless device; and pairing, by the first wireless device, with the second wireless device based on a password-based authenticated key exchange (PAKE) protocol and by using the first password as an encryption password in a key exchange process.

SYSTEMS AND METHODS FOR CONFIGURING INDUSTRIAL DEVICES THROUGH A SECURED WIRELESS SIDE CHANNEL
20230052998 · 2023-02-16 ·

Systems and methods for configuring industrial devices through a secured wireless side channel may include a compute device. The compute device may have primary communication circuitry configured to communicate through a network and side channel communication circuitry configured to communicate through a wireless side channel that is different from the network. The compute device may additionally include circuitry configured to obtain, via the wireless side channel, configuration data indicative of a configuration for one or more operations of an industrial device of an industrial process plant. Additionally the circuitry may be configured to configure, in response to obtaining the configuration data, the one or more operations of the industrial device.

SYSTEMS AND METHODS FOR CONFIGURING INDUSTRIAL DEVICES THROUGH A SECURED WIRELESS SIDE CHANNEL
20230052998 · 2023-02-16 ·

Systems and methods for configuring industrial devices through a secured wireless side channel may include a compute device. The compute device may have primary communication circuitry configured to communicate through a network and side channel communication circuitry configured to communicate through a wireless side channel that is different from the network. The compute device may additionally include circuitry configured to obtain, via the wireless side channel, configuration data indicative of a configuration for one or more operations of an industrial device of an industrial process plant. Additionally the circuitry may be configured to configure, in response to obtaining the configuration data, the one or more operations of the industrial device.

METHOD FOR AUTHENTICATING A USER TERMINAL
20230049377 · 2023-02-16 ·

A method for authenticating a user terminal as a transmitter of a message transmitted in a wireless communication network having a plurality of spatially distributed user terminals, The message is transmitted from a first user terminal to at least one second and/or one third user terminal with the aid of a wireless communications connection. The message includes useful data, first user-terminal-specific and second user-terminal-specific authentication data. The first user terminal is authenticated as the transmitter of the message based on the first user-terminal-specific authentication data with the aid of the second user terminal, and/or based on the second user-terminal-specific authentication data with the aid of the third user terminal.

METHOD FOR AUTHENTICATING A USER TERMINAL
20230049377 · 2023-02-16 ·

A method for authenticating a user terminal as a transmitter of a message transmitted in a wireless communication network having a plurality of spatially distributed user terminals, The message is transmitted from a first user terminal to at least one second and/or one third user terminal with the aid of a wireless communications connection. The message includes useful data, first user-terminal-specific and second user-terminal-specific authentication data. The first user terminal is authenticated as the transmitter of the message based on the first user-terminal-specific authentication data with the aid of the second user terminal, and/or based on the second user-terminal-specific authentication data with the aid of the third user terminal.

THIRD PARTY CERTIFICATE MANAGEMENT FOR NATIVE AND THIRD PARTY MOBILE APPS
20230049095 · 2023-02-16 · ·

Systems and methods are disclosed herein for real-time digital authentication. According to some embodiments, a certification authentication method includes receiving a list of third party root certificates from a remote server, the list of third party root certificates including at least one association between a program configured to run on the computing apparatus and a public key for authenticating communication between the program and an associated server of the program. The method may also include authenticating the list of third party root certificates. The method may also include initiating a communication between the computing apparatus and the associated server and authenticating the communication with the associated server using the public key. Furthermore, the method may also include loading the program onto the one or more memories during a bootstrapping process in response to determining that the communication with the associated server is authentic.

COMBINED SECURITY ACCESS SYSTEM
20230047088 · 2023-02-16 · ·

A combined security access system for a building that includes a controllable building component. The system includes a combined security access device connected to the building component. The access device further includes: a processor; a first memory device connected to the processor; a second memory device connected to the processor; and a wireless interface module connected to the processor. The access device may be connected to an external electronic device, and the external electronic device communicates with the processor of the access control system to control the building component.

Prompt and secure data communication pairing

Prompt and secure data communication paring concepts are described. In one example, a method for data communications includes a client device receiving an advertising packet from a peripheral device, comparing a signal strength indicator for the advertising packet to a threshold, generating a session key based on the comparing, and transmitting the session key to the peripheral device. The method also includes communicating and acknowledging one or more data chunks between the devices through a secure communications channel. The concepts are different that traditional pairing techniques for short-range, low-power wireless data communications in that secure communications channels can be achieved automatically, relatively more quickly, and repeatedly without the need for user intervention. The secure communications channels can be established and reestablished without the need for traditional pairing techniques.