H04W12/069

Distributed management of secure Wi-Fi network
11582604 · 2023-02-14 · ·

Generally described, the presently disclosed technology utilizes managed Wi-Fi networks pre-installed throughout an MDU property to provide user-specific passphrases that can be used to access the single-SSID wireless network at the property and to provide a cloud portal that can enable convenient access to the functionalities (both by the resident and the manager) provided by the Wi-Fi controller and the Wi-Fi access points. By doing so, the Wi-Fi network management solutions described herein allow the users to experience the benefits of a shared Wi-Fi infrastructure, such as not having to set up and maintain their own Wi-Fi routers, while also allowing them to easily change their Wi-Fi settings from their connected devices.

Management of access credentials

Various embodiments include computing devices and methods for management of access credentials. A processor of a computing device may receive an authentication request from a client application support service to authenticate a client application. The processor may send a response comprising an authentication token to the client application support service. The processor may receive from the client application support service a request for an access token to access a target system. The processor may send a response comprising the access token to the client application support service to enable the client application support service to access the target system using the access token on behalf of the client application.

Management of access credentials

Various embodiments include computing devices and methods for management of access credentials. A processor of a computing device may receive an authentication request from a client application support service to authenticate a client application. The processor may send a response comprising an authentication token to the client application support service. The processor may receive from the client application support service a request for an access token to access a target system. The processor may send a response comprising the access token to the client application support service to enable the client application support service to access the target system using the access token on behalf of the client application.

Systems and methods for user-specific slice configuration for an application

A device may receive, from a user equipment, a token request associated with an application, wherein the token request is associated with a device identifier. The device may generate a device token for the application and the user equipment. The device may provide, using the device identifier, the device token to the user equipment to enable a user to access the application via an application platform. The device may receive, from the application platform, a slice request for a network slice of a network that is to be used for an application session. The device may determine that the user equipment is associated with the application session based on the device token and the device identifier. The device may configure a network slice instance of the network slice. The device may determine a user equipment route selection policy for the application session according to the network slice instance.

A METHOD OF EFFICIENTLY PROVIDING PATHHISTORY IN C-V2X
20230045323 · 2023-02-09 ·

Various embodiments provide methods, vehicle computing devices, storage media, and systems for briefly providing PathHistory information in Broadcast Safety Messages (BSMs) sent from a vehicle when PathHistory information is not required to be included in all BSMs. Various embodiments may include broadcasting BSMs including PathHistory information during a period of time following a change of the vehicle's pseudonym certificate and broadcasting BSMs without PathHistory information at all other times. Some embodiments may further include determining whether sufficient path history points are available for PathHistory information generation, accumulating path history points in response to determining that sufficient path history points are not available for PathHistory information generation, and broadcasting BSMs including PathHistory information during the period of time once sufficient path history points have been accumulated.

A METHOD OF EFFICIENTLY PROVIDING PATHHISTORY IN C-V2X
20230045323 · 2023-02-09 ·

Various embodiments provide methods, vehicle computing devices, storage media, and systems for briefly providing PathHistory information in Broadcast Safety Messages (BSMs) sent from a vehicle when PathHistory information is not required to be included in all BSMs. Various embodiments may include broadcasting BSMs including PathHistory information during a period of time following a change of the vehicle's pseudonym certificate and broadcasting BSMs without PathHistory information at all other times. Some embodiments may further include determining whether sufficient path history points are available for PathHistory information generation, accumulating path history points in response to determining that sufficient path history points are not available for PathHistory information generation, and broadcasting BSMs including PathHistory information during the period of time once sufficient path history points have been accumulated.

BLUETOOTH CONNECTION METHOD, SYSTEM, AND ELECTRONIC DEVICE

Embodiments of this application provide a Bluetooth connection method, a system, and an electronic device. In the method, when a communication connection between an electronic device and a vehicle head unit is disconnected, the electronic device starts to scan a Bluetooth advertising signal. When a user carrying the electronic device is close to the vehicle head unit, the electronic device may obtain, through scanning, a Bluetooth advertising signal sent by the vehicle head unit. When obtaining, through scanning, the Bluetooth advertising signal sent by the vehicle head unit, the electronic device may start a vehicle manufacturer application when the vehicle manufacturer application is cleared by a system. The electronic device may reconnect to the vehicle head unit through Bluetooth by using the vehicle manufacturer application and a Bluetooth chip. Embodiments of this application can improve convenience of unlocking in a scenario in which a vehicle is insensibly unlocked.

TERMINAL DEVICE VERIFICATION METHOD AND APPARATUS
20230044476 · 2023-02-09 ·

A terminal device verification method and an apparatus are provided. The method includes: A first network device receives a first message from a first terminal device. Then, the first network device verifies a pairing relationship between the first terminal device and a second terminal device. After the verification on the pairing relationship between the first terminal device and the second terminal device succeeds, the first network device sends a second message to the first terminal device, where the second message include first indication information, and the first indication information is used to indicate a pairing result of the first terminal device and the second terminal device. The pairing relationship between the first terminal device and the second terminal device is verified, so that the first terminal device and the second terminal device can be securely paired, to improve use security of the first terminal device and the second terminal device.

TERMINAL DEVICE VERIFICATION METHOD AND APPARATUS
20230044476 · 2023-02-09 ·

A terminal device verification method and an apparatus are provided. The method includes: A first network device receives a first message from a first terminal device. Then, the first network device verifies a pairing relationship between the first terminal device and a second terminal device. After the verification on the pairing relationship between the first terminal device and the second terminal device succeeds, the first network device sends a second message to the first terminal device, where the second message include first indication information, and the first indication information is used to indicate a pairing result of the first terminal device and the second terminal device. The pairing relationship between the first terminal device and the second terminal device is verified, so that the first terminal device and the second terminal device can be securely paired, to improve use security of the first terminal device and the second terminal device.

ACCESS AND MESSAGING IN A MULTI CLIENT NETWORK

A messaging system for exchanging messages between nodes in a network via a broker that uses a publish-subscribe message protocol, which nodes have object identifications (IDs). Messages between the nodes are routed using the object IDs of the nodes. Secure communication is provided using authentication according to digital certificates being used as first and second tiers by a commissioning broker and a data broker, respectively, in which the second tier certificate used by the data broker has a shorter lived expiration time.