Patent classifications
H04W12/106
Methods, systems, and computer readable media for mitigating unauthorized message relay attacks
According to one method, the method occurs at a network node configured to relay network message information or derivative information to avoid resource contentions between user equipment (UE). The method includes receiving a first temporary UE identifier (TUEI) associated with a first UE for requesting a radio resource within a serving cell; assigning, using the first TUEI, the radio resource to the first UE; generating, using at least a conversion algorithm, a second value based on the first TUEI, wherein the second value has a higher entropy characteristic than the first TUEI, thereby reducing the likelihood of the second value including an encoded message decodable by a second UE when relayed by the network node; and broadcasting a message including the second value to a plurality of UEs including the second UE.
Methods, systems, and computer readable media for mitigating unauthorized message relay attacks
According to one method, the method occurs at a network node configured to relay network message information or derivative information to avoid resource contentions between user equipment (UE). The method includes receiving a first temporary UE identifier (TUEI) associated with a first UE for requesting a radio resource within a serving cell; assigning, using the first TUEI, the radio resource to the first UE; generating, using at least a conversion algorithm, a second value based on the first TUEI, wherein the second value has a higher entropy characteristic than the first TUEI, thereby reducing the likelihood of the second value including an encoded message decodable by a second UE when relayed by the network node; and broadcasting a message including the second value to a plurality of UEs including the second UE.
Refreshing security keys in 5G wireless systems
Techniques for refreshing security keys for enciphering and deciphering packets in a wireless communications system are provided. An exemplary method generally includes transmitting, while in a state with no dedicated resources allocated to the UE, a first message to request resumption of a radio resource control (RRC) connection, the first message encrypted using a first set of one or more keys, receiving, in response to the first message, a second message encrypted using the first set of one or more keys or a second set of one or more keys, determining, based on an indication in the second message or received prior to the second message, whether portions of the second message are encrypted using the second set of one or more keys, and processing the second message using the first set of one or more keys or the second set of one or more keys, based on the determination.
Refreshing security keys in 5G wireless systems
Techniques for refreshing security keys for enciphering and deciphering packets in a wireless communications system are provided. An exemplary method generally includes transmitting, while in a state with no dedicated resources allocated to the UE, a first message to request resumption of a radio resource control (RRC) connection, the first message encrypted using a first set of one or more keys, receiving, in response to the first message, a second message encrypted using the first set of one or more keys or a second set of one or more keys, determining, based on an indication in the second message or received prior to the second message, whether portions of the second message are encrypted using the second set of one or more keys, and processing the second message using the first set of one or more keys or the second set of one or more keys, based on the determination.
Creation of a blockchain for maintenance records using identification tags
A blockchain maintenance record system for managing maintenance records of a system, the blockchain maintenance record system including: a part identification tag configured to be located on a part; an application operable through a mobile computing device, the mobile computing device being configured to read the part identification tag, wherein the application is configured to perform operations including; determining a part identity of the part by reading the part identification tag; detecting a location of the system; organizing the part identity of the part and the location of the part into a maintenance data package receipt; and uploading the maintenance data package receipt into a blockchain network.
Antenna switching control for AOA capturing in phone-as-a-key systems with de-whitened tone transmission, CRC based validation and event timing
A reader includes a transceiver and a control module. The transceiver is configured to, during a current connection event, monitor notification messages transmitted from a portable access device to a phone-as-a-key (PaaK) system of a vehicle, where the notification messages are transmitted to establish a communication link between the portable access device and the PaaK system. The control module is configured to: perform an in-phase and quadrature phase capture of the notification messages based on fields in one or more of the notification messages, where the fields include a mobile de-whitened section including two or more series of consecutive bits, where the consecutive bits in each of the one or more series are all zeros or all ones; based on the in-phase and quadrature phase capture, determine an angle-of-arrival of the notification messages, and indicate the angle-of-arrival to the PaaK system for permitted access determined by the PaaK system.
Wireless communication apparatus and method
According to one embodiment, a wireless communication apparatus includes a transmitter. The transmitter transmits, in a first period, a first information frame. The first information frame includes first, verification information and a first key usable in the first period. The transmitter transmits, in the first period and after transmitting the first information frame, a data frame including first data. The transmitter transmits, in the first period and after transmitting the first information frame, a second information frame. The data frame includes a fourth key usable in a second period following the first period. The transmitter transmits, in the second period, a third information frame including third verification information and the fourth key.
Wireless communication apparatus and method
According to one embodiment, a wireless communication apparatus includes a transmitter. The transmitter transmits, in a first period, a first information frame. The first information frame includes first, verification information and a first key usable in the first period. The transmitter transmits, in the first period and after transmitting the first information frame, a data frame including first data. The transmitter transmits, in the first period and after transmitting the first information frame, a second information frame. The data frame includes a fourth key usable in a second period following the first period. The transmitter transmits, in the second period, a third information frame including third verification information and the fourth key.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SINGLE-USE AUTHENTICATION MESSAGES
A method for creating single-use authentication messages includes creating, at a consumer network function of a core network of a telecommunications network, a message hash of at least a subset of a request message. The method includes adding, at the consumer network function, the message hash to a client credentials assertion (CCA) token for the consumer network function. The method includes sending, from the consumer network function, the request message with the CCA token to a producer network function.
UE REJECTION HANDLING WHEN ONBOARDING A NETWORK BASED ON DEFAULT UE CREDENTIALS
A method of UE onboarding services can include receiving a first reject message at a UE from a first wireless communication network during a first onboarding process of the UE based on a set of default UE credentials stored in the UE. An identity of the first wireless communication network can be added to a forbidden network list for onboarding services. The UE can perform a network selection process, based on the forbidden network list including the identity of the first wireless communication network, to select a second wireless communication network for a second onboarding process of the UE. The first wireless communication network on the forbidden network list is excluded from available candidate wireless communication networks that support onboarding services. The same set of default UE credentials stored in the UE are used for the second onboarding process of the UE.