H04W12/106

DETECTION DEVICE, VEHICLE, DETECTION METHOD, AND DETECTION PROGRAM

A detection device configured to detect an unauthorized message in an in-vehicle network installed in a vehicle includes: a monitoring unit configured to monitor messages transmitted in the in-vehicle network; a calculation unit configured to, on the basis of a monitoring result by the monitoring unit, calculate a statistic value regarding target messages that have been transmitted in the in-vehicle network in a predetermined period and that are each a message having identification information provided for each kind of target information to be used in the vehicle; and a detection unit configured to perform a detection process of detecting the unauthorized message on the basis of the statistic value calculated by the calculation unit.

WIRELESS NETWORK SWITCHING METHOD AND DEVICE

A wireless network switching method. In the method, a station and a target access device directly generate a message integrity check key by means of a domain key, and verify an integrity code on the basis of the message integrity check key, so as to realize the authentication of two parties; and when the authentication of the opposite party is successful, session keys are generated by means of the domain key and in conjunction with random numbers of the two parties, thereby simplifying a switching process and realizing secure and efficient network switching. Further disclosed are a corresponding station and a corresponding access device.

WIRELESS NETWORK SWITCHING METHOD AND DEVICE

A wireless network switching method. In the method, a station and a target access device directly generate a message integrity check key by means of a domain key, and verify an integrity code on the basis of the message integrity check key, so as to realize the authentication of two parties; and when the authentication of the opposite party is successful, session keys are generated by means of the domain key and in conjunction with random numbers of the two parties, thereby simplifying a switching process and realizing secure and efficient network switching. Further disclosed are a corresponding station and a corresponding access device.

Protection of Resume Request Messages

Embodiments are presented herein of apparatuses, systems, and methods for a user equipment device (UE) and/or cellular network to resume a connection. To resume the connection, the UE may transmit a fully protected connection resume message, e.g., which may include protection for a resume cause field.

Protection of Resume Request Messages

Embodiments are presented herein of apparatuses, systems, and methods for a user equipment device (UE) and/or cellular network to resume a connection. To resume the connection, the UE may transmit a fully protected connection resume message, e.g., which may include protection for a resume cause field.

COMMUNICATION METHOD AND APPARATUS
20220418013 · 2022-12-29 · ·

A communication method and apparatus, and relate to the communication field. A network side may control establishment of a connection, between a terminal device and a UPF network element, allowed to be shared by a plurality of traffic flows, thereby reducing a connection establishment process. The method includes: an SMF network element receives, from a terminal device, a first message used to request to establish or update a PDU session; and the SMF network element sends a second message to the terminal device, where the second message is used to indicate that the PDU session is successfully established or updated, the second message includes a multi-flow connection parameter, and the multi-flow connection parameter is used to indicate that a plurality of traffic flows in the PDU session are transmitted by using a same connection.

Method and apparatus for managing user authentication in a blockchain network

Provided is an apparatus for managing user authentication in a blockchain network and the apparatus comprises a processor configured to transmit, to a server, a request for a snapshot identifier (ID) with user data comprising at least one of one-time password, biometric data, context data, routine data, or device metadata, receive the snapshot ID generated based on the user data, initiate a transaction with the snapshot ID in the blockchain network comprising a blockchain server which authenticates the snapshot ID, and output blockchain transaction data associated with the transaction based on the authentication of the snapshot ID.

System and method for providing secure and reliable communication over a low-energy wireless communication protocol
11540119 · 2022-12-27 · ·

A system and method for encrypting a data frame of a low-power communication protocol. The method includes providing an input data frame, the input date frame includes a random number, a unique identifier, and a payload data, encrypting the payload data, generating a Message Integrity Code (MIC), generating a rotating identifier by encrypting the unique identifier, and generating an output frame based on the generated rotating identifier, the generated MIC, and the encrypted payload data.

System and method for providing secure and reliable communication over a low-energy wireless communication protocol
11540119 · 2022-12-27 · ·

A system and method for encrypting a data frame of a low-power communication protocol. The method includes providing an input data frame, the input date frame includes a random number, a unique identifier, and a payload data, encrypting the payload data, generating a Message Integrity Code (MIC), generating a rotating identifier by encrypting the unique identifier, and generating an output frame based on the generated rotating identifier, the generated MIC, and the encrypted payload data.

Transmission of medical information in disrupted communication networks

Described herein are methods and systems to send/receive medical data from one or more electronic devices to a secondary medical unit in delayed, intermittently-connected, low-bandwidth (DIL) environments. An application executing on the electronic devices may, in response to detecting a disruption within a communication network, execute an offline communication protocol to transmit medical data among a predetermined number of other electronic devices, wherein the offline communication protocol does not use the communication network. The application may then receive a request from a server of the secondary medical unit to transmit at least a part of the medical data. In response to authenticating the request, the application then transmits the medical data using an online communication protocol that uses the communication network or using an offline communication protocol.