Patent classifications
H04W12/106
Key generation method, apparatus, and system
A method includes receiving, by a mobility management entity (MME), a redirection request message from an access and mobility management function (AMF) node, where the redirection request message includes key-related information. The method also includes generating, by the MME, an encryption key and an integrity protection key based on the key-related information. The redirection request message is used to request to hand over a voice service from a packet switched (PS) domain to a circuit switched (CS) domain.
Information handling system threat management
Plural Internet of Things (IoT) gateways detect, secure against and remediate malicious code with an autonomous communication of tokens between the IoT gateways on a time schedule. Detection of an invalid token or a token communication outside of a scheduled time indicates that malicious code may have interfered with token generation or communication. Once malicious code is verified on an IoT gateway, the failed gateway is remediated to an operational state, such as with a re-imaging by another IoT gateway through an in band communication or a re-imaging by a server information handling system through an out of band communication.
SYSTEMS AND METHODS FOR PROVIDING SECURE DATA FOR WAGERING FOR LIVE SPORTS EVENTS
Systems and methods for live sporting event wagering with data security and integrity are disclosed. At least one input capture device and at least one user device are constructed and configured in network communication with at least one computing platform. The at least one input capture device is configured to transmit live input data relating to a live sporting event to the at least one computing platform in real time or near real time. The at least one computing platform is configured to aggregate and analyze the live input data, thereby creating analyzed data. The at least one computing platform is further configured to set odds for wagering in the live sporting event based on the analyzed data in real time or near real time. The at least one user device is configured to display the odds, receive bets, and transmit the bets to the at least one computing platform.
Techniques to manage integrity protection
Wireless communication methods are described for a user plane integrity protection failure detection and handling, determination and management of integrity protection enabled data rate that exceeds or is close to exceeding a user equipment's capability or threshold, and management of integrity protection or encryption mechanisms in a dual-connectivity system that includes a master network node and a secondary network node.
Techniques to manage integrity protection
Wireless communication methods are described for a user plane integrity protection failure detection and handling, determination and management of integrity protection enabled data rate that exceeds or is close to exceeding a user equipment's capability or threshold, and management of integrity protection or encryption mechanisms in a dual-connectivity system that includes a master network node and a secondary network node.
System and method for providing an enhanced acknowledgement frame
A system for providing an enhanced acknowledgement (ENH-ACK) frame is configured to receive an incoming packet transmitted by an external device, determine that an ENH-ACK response is required based on a MAC header of the incoming packet schedule transmission of the ENH-ACK frame to the external device in accordance with a standard turnaround time limit relative to receipt of the incoming packet, determine contents of one or more packet processed fields of the ENH-ACK frame and populate the one or more packet processed fields, and complete transmission of the ENH-ACK frame with the populated packet processed fields.
Non-transitory computer-readable medium storing computer-readable instructions for terminal device and terminal device
A terminal device may obtain a public key and target identification information from a communication device, search for the communication device via a wireless interface of the terminal device, based on the target identification information and a result of the search for the communication device, determine whether the communication device is to establish a wireless connection with an external device or with the terminal device, in a case where it is determined that the communication device is to establish the wireless connection with the external device, send first connection information to the communication device, in a case where it is determined that the communication device is to establish the wireless connection with the terminal device, send second connection information different from the first connection information to the communication device, establish the wireless connection with the communication device via the wireless interface by using the second connection information.
KEY GENERATION METHOD, APPARATUS, AND SYSTEM
A key generation method includes determining, by an access and mobility management function node, key-related information. The method also includes sending, by the access and mobility management function node, a redirection request message to a mobility management entity. The redirection request message includes the key-related information, and the redirection request message is used to request to hand over a voice service from a packet switched (PS) domain to a circuit switched (CS) domain. The method further includes receiving, by the mobility management entity, the redirection request message. The method additionally includes generating, by the mobility management entity, an encryption key and an integrity protection key for the voice service based on the key-related information.
KEY GENERATION METHOD, APPARATUS, AND SYSTEM
A key generation method includes determining, by an access and mobility management function node, key-related information. The method also includes sending, by the access and mobility management function node, a redirection request message to a mobility management entity. The redirection request message includes the key-related information, and the redirection request message is used to request to hand over a voice service from a packet switched (PS) domain to a circuit switched (CS) domain. The method further includes receiving, by the mobility management entity, the redirection request message. The method additionally includes generating, by the mobility management entity, an encryption key and an integrity protection key for the voice service based on the key-related information.
ASSOCIATION CONTROL METHOD AND RELATED APPARATUS
An association control method and a related apparatus are provided and are applied to short-range communication. The method includes: determining that an identity of a second node is trusted; sending a first authentication request to the second node, where the first authentication request includes first identity authentication information generated based on a shared key; receiving a first authentication response from the second node, where the first authentication response includes second identity authentication information; performing verification on the second identity authentication information based on the shared key; and updating a first authentication failure counter if the verification fails. This can prevent a node from establishing an association with an unauthorized attacker, and protect data security of the node.