H04W12/104

PASSIVE DIGITAL KEY SYSTEMS
20220322085 · 2022-10-06 ·

Techniques are provided for validating a mobile device in a passive digital key system. An example method of validating a mobile device includes determining a positioning measurement for the mobile device relative to a reference point, obtaining a measured distance with at least a first transceiver, obtaining a calibration distance based at least in part on the positioning measurement for the mobile device, computing a validation distance based at least in part on a difference between the measured distance and the calibration distance, and validating the mobile device based at least in part on a comparison of the validation distance and a threshold value.

ERRONEOUS TIME AND LOCATION DETECTION AND CORRECTION
20230152471 · 2023-05-18 ·

Systems and techniques are described for detecting one or more timing errors. For example, a system can receive, from a navigation system, navigation timestamp information at a first instance and a second instance. The system can determine a navigation system time difference based on the navigation timestamp information at the first instance and the second instance. The system can further receive, from a wireless device, network timestamp information at the first instance and the second instance. The system can determine a network time difference based on the network timestamp information at the first instance and the second instance. The system can further determine whether time reporting by the navigation system is correct based on the navigation system time difference and the network time difference.

METHOD FOR CHANGING MOBILE COMMUNICATION DEVICE FUNCTIONALITY BASED UPON RECEIPT OF A SECOND CODE

The method disclosed herein provides for performing device authentication based on the of proximity to another device, such as a key device. When a key device is not near a mobile communications device, an unlock screen is allowed to be presented on a display screen. Based on the mobile communications device receiving a first code to unlock the mobile communications device, the mobile communications device is unlocked in a first mode. Based on receiving a second code while the unlocked mobile communications device is in the first mode, the unlocked mobile communications device changes from the first mode to a second mode, wherein a level of functionality of the mobile communications device in the second mode is greater than a level of functionality of the mobile communications device in the first mode

VERIFIED POSITION INFORMATION

A method of a wireless communication device of acquiring position information. The method comprises transmitting, to a service-providing node, a request for service, receiving, from the service-providing node, a request for information indicating the position of the wireless communication device, receiving, from a network node, information indicating a position of the wireless communication device, the information having been provided with an indication of authenticity by the network node, and transmitting, to the service-providing node, the position information having been provided with an indication of authenticity.

VERIFIED POSITION INFORMATION

A method of a wireless communication device of acquiring position information. The method comprises transmitting, to a service-providing node, a request for service, receiving, from the service-providing node, a request for information indicating the position of the wireless communication device, receiving, from a network node, information indicating a position of the wireless communication device, the information having been provided with an indication of authenticity by the network node, and transmitting, to the service-providing node, the position information having been provided with an indication of authenticity.

SECURITY FOR PROSE GROUP COMMUNICATION
20170359322 · 2017-12-14 · ·

A method of performing authentication and authorization in Proximity based Service (ProSe) communication by a requesting device (31) which sends a request of a communication and a receiving device (32) which receives the request from the requesting device (31) and (32), the method including deriving session keys Kpc and Kpi from an unique key Kp at the requesting and receiving devices (31) and (32), using the session keys Kpc and Kpi for ProSe communication setup and direct communication between the requesting and receiving devices (31) and (32), starting the direct communication with the requesting and receiving devices (31) and (32). The key Kpc is confidentiality key and the key Kpi is integrity protection key.

Global resource locator
09841494 · 2017-12-12 · ·

The present disclosure relates to methods and apparatus for accurately calculating time with a Miniature Atomic Clock along with other components that can receive process and communicate information to enable locating, identifying, and tracking physical Assets and data contained within the Assets. More specifically, the present disclosure presents a Global Resource Locating (GRL) device and service that may be adhered or inserted in the Asset, which may be built in or attached to a second Asset, wherein the device may comprise a receiver and a trilateration mechanism. In some aspects, the Asset may comprise a product, organism, produce, or component of a logistics based operational process and marketing based Asset movement and usage analysis.

Misbehavior detection for vehicle-to-everything messages

The disclosure includes embodiments for an ego vehicle to detect misbehavior. According to some embodiments, a method includes receiving a V2X message from an attacker. The V2X message includes V2X data describing a location of an object at a target time. The method includes receiving a set of CPMs from a set of remote devices. The set of CPMs include remote sensor data describing a free space region within the roadway environment. The method includes determining a relevant subset of the CPMs include remote sensor data that is relevant to detecting misbehavior. The method includes determining, based at least in part on the remote sensor data of the relevant subset, that the object is not located at the location at the target time. The method includes detecting the misbehavior by the attacker based on the determination that the object is not located at the location at the target time.

INTEGRITY PROTECTION METHOD AND SYSTEM
20230188995 · 2023-06-15 · ·

An integrity protection method and system are provided. The method includes: calculating, by an integrity protection system, first information; and performing an integrity check by using the first information to determine the degree of reliability of a target system. The first information is calculated according to at least one of the following: sampling data of a first communication device, sampling data of a second communication device, or target risk tolerance. The target system includes the first communication device and the second communication device.

INTEGRITY PROTECTION METHOD AND SYSTEM
20230188995 · 2023-06-15 · ·

An integrity protection method and system are provided. The method includes: calculating, by an integrity protection system, first information; and performing an integrity check by using the first information to determine the degree of reliability of a target system. The first information is calculated according to at least one of the following: sampling data of a first communication device, sampling data of a second communication device, or target risk tolerance. The target system includes the first communication device and the second communication device.