Patent classifications
H04W12/106
BLOCKCHAIN AUTHENTICATOR FOR DYNAMIC SPECTRUM SHARING AND BLOCKCHAIN CYBERSECURITY SERVICES
Blockchain algorithms may be used to authenticate frequency changes and create a log of when DSS frequencies were modified. This approach may allow for a secure log that will detail the history of when frequencies were changed by the frequency owner or a delegated third party to perform spectrum access sharing (SAS) services.
Devices, methods, and computer program for releasing transportation vehicle components, and vehicle-to-vehicle communication module
Devices, methods, and a computer program for releasing transportation vehicle components and a vehicle-to-vehicle communication module. The device for releasing a vehicle component of a transportation vehicle includes at least one interface for communication with further vehicle components of the transportation vehicle and a control module for controlling the at least one interface to receive messages from the further vehicle components of the transportation vehicle and to verify the identity of the further vehicle components based on the received messages and the stored identification data of the further vehicle components. The messages on which the verification of the identity of the further vehicle components is based are messages used in regular operation of the vehicle component. The control module also releases the vehicle component in response to the identity of the further transportation vehicle components being consistent with the stored identification data of the further vehicle components.
Devices, methods, and computer program for releasing transportation vehicle components, and vehicle-to-vehicle communication module
Devices, methods, and a computer program for releasing transportation vehicle components and a vehicle-to-vehicle communication module. The device for releasing a vehicle component of a transportation vehicle includes at least one interface for communication with further vehicle components of the transportation vehicle and a control module for controlling the at least one interface to receive messages from the further vehicle components of the transportation vehicle and to verify the identity of the further vehicle components based on the received messages and the stored identification data of the further vehicle components. The messages on which the verification of the identity of the further vehicle components is based are messages used in regular operation of the vehicle component. The control module also releases the vehicle component in response to the identity of the further transportation vehicle components being consistent with the stored identification data of the further vehicle components.
Data security processing method and apparatus
Example data security processing methods and apparatus are described. One example method includes setting up a first PDU session. A first base station derives a first user plane key based on a received base key and performs security processing on user plane data in the first PDU session by using the first user plane key and a security algorithm. A second PDU session is set up. The first base station derives a second user plane key based on the base key and performs security processing on user plane data in the second PDU session by using the second user plane key and the security algorithm. The user plane key includes a user plane encryption key and/or a user plane integrity protection key.
Data security processing method and apparatus
Example data security processing methods and apparatus are described. One example method includes setting up a first PDU session. A first base station derives a first user plane key based on a received base key and performs security processing on user plane data in the first PDU session by using the first user plane key and a security algorithm. A second PDU session is set up. The first base station derives a second user plane key based on the base key and performs security processing on user plane data in the second PDU session by using the second user plane key and the security algorithm. The user plane key includes a user plane encryption key and/or a user plane integrity protection key.
Method for securely transmitting lighting scenes over a computer network with cloud setup and authentication
Techniques for securely controlling multiple lighting devices simultaneously with a lighting control device are disclosed. Command messages may be transmitted from the lighting control device to multiple lighting devices over a computer network without routing through a remote cloud service. The messages may be encrypted and may include an incremented sequence number. Lighting devices that receive a command message may compare the incremented sequence number to a previously stored sequence number corresponding to the lighting control device. If the incremented sequence number is greater than the stored sequence number, then a lighting device may determine the message was transmitted by an authorized lighting control device and may implement any command instruction included therein. If the incremented sequence number is equal to or less than the stored sequence number, then the lighting device may determine the command message was transmitted by a malicious source and may ignore the command message.
Review recordation and evaluation systems and methods
A computer-implemented system and method for generating and displaying an authority score through a software application executed by a process or a computing device. The processor may receive visit data indicative of a user's presence and review data describing an entity at a location. The processor may determine an authority score for the review data and perform a calculation using at least a portion of the visit data as at least one input. The processor may generate and cause a visual indication of the authority score to be displayed by a display device.
METHODS FOR PERFORMING AN AUTHENTICATION PROCEDURE AND FOR MESSAGE EXCHANGE
A method (100) for performing an authentication procedure between a verifying device and a responding device is disclosed, the verifying and responding devices being provisioned with security credentials. The method, performed by the verifying device, comprises generating an authentication challenge (110), delivering the authentication challenge to the responding device (120), receiving an authentication response from the responding device (130), and verifying the authentication response (140). According to the method, at least one of the authentication challenge or authentication response is encoded as a sequence of qubits and delivered over a quantum communication channel between the verifying device and the responding device (120A, 120B, 130A, 130B). Also disclosed are methods for delivering and receiving a message over a quantum communication channel, and devices for performing authentication and message exchange methods.
DETECTING SIDELINK ATTACKS
There is provided an apparatus for a sidelink, SL, communication comprising means for transmitting a transport block, TB, via the SL communication, means for receiving a feedback in response to the transmitted TB, means for storing information contained in the transmitted TB upon receiving said feedback, means for receiving a status report comprising information associated with the TB, and means for comparing said information contained in the status report with said stored information contained in the transmitted TB in order to identify an attacker based on discrepancy between said information contained in the status report and said stored information contained in the transmitted TB.
METHOD AND DEVICE FOR VALIDATING VEHICLE-TO-X MESSAGES IN ORDER TO REGULATE THE TRAFFIC FLOW
A method for validating vehicle-to-X messages by a computing apparatus of a vehicle comprises receiving at least one vehicle-to-X message comprising information for regulating the traffic flow, and validating the at least one message, wherein, within the framework of the validation, at least a part of the message content comprised by the at least one message is checked for the consistency thereof. A device for validating vehicle-to-X messages and a vehicle are also disclosed.