Patent classifications
H04W12/106
System and method for providing security services with multi-function supply chain hardware integrity for electronics defense (SHIELD)
A system and a method for a supply-chain hardware integrity for electronics defense (SHIELD) dielet embedded over a component of a device, a radio frequency identification (RFID) probe system coupled to the SHIELD dielet, and a secure server system communicating with the RFID probe system that can enable security services is provided. Embodiments include a multi-function SHIELD software defined, hardware enabled security system that provides hardware identity, anti-tamper, encryption key generation and management, trusted platform module services, and cryptographic software security services for a device.
Inter-RAT (radio access technology) reestablishment enhancements in multi-RAT dual connectivity (MR-DC)
Embodiments include methods for a target node to establish a connection with a user equipment (UE) operating in dual connectivity (DC) with a PCell utilizing a first radio access technology (RAT) and with a PSCell utilizing a second RAT. Embodiments include receiving, from the UE, a re-establishment request message comprising parameters associated with the PSCell, a first message authentication code (MAC), and an indication of the UE's selection of a target cell served by the target node as a replacement for the PCell. The target cell utilizes the second RAT. Embodiments include verifying the message integrity based on the first MAC, and determining a full UE context based on the plurality of parameters associated with the PSCell and on a successful verification of the message integrity. Embodiments include establishing a connection with the UE based on the full UE context, whereby the target cell serves as a PCell for DC.
Inter-RAT (radio access technology) reestablishment enhancements in multi-RAT dual connectivity (MR-DC)
Embodiments include methods for a target node to establish a connection with a user equipment (UE) operating in dual connectivity (DC) with a PCell utilizing a first radio access technology (RAT) and with a PSCell utilizing a second RAT. Embodiments include receiving, from the UE, a re-establishment request message comprising parameters associated with the PSCell, a first message authentication code (MAC), and an indication of the UE's selection of a target cell served by the target node as a replacement for the PCell. The target cell utilizes the second RAT. Embodiments include verifying the message integrity based on the first MAC, and determining a full UE context based on the plurality of parameters associated with the PSCell and on a successful verification of the message integrity. Embodiments include establishing a connection with the UE based on the full UE context, whereby the target cell serves as a PCell for DC.
METHOD AND SYSTEM FOR REDUCED V2X RECEIVER PROCESSING LOAD USING NETWORK BASED APPLICATION LAYER MESSAGE PROCESSING
A method at a network element for processing a first message destined for an intelligent transportation system station, the method including receiving from a sending entity, or generating, the first message at the network element; based on a source or contents of the first message, performing one of: discarding the first message; or modifying the first message to provide an indication to the intelligent transportation system station of checks the intelligent transportation system does not need to perform, thereby creating a second message; and forwarding the second message to the intelligent transportation system station.
CASH REGISTER AND TICKET VENDING WITH MINIMAL INFRASTRUCTURE
Described herein are a cash register and a ticket vending mechanism that require little or no merchant infrastructure resulting in dramatic cost reduction for merchants. These are made possible through a payer-centric payment paradigm where the payer—as opposed to the merchant—completes the payment transaction without depending on the merchant, resulting in increased payer convenience and payment security.
Key change procedure
There is provided mechanisms for configuring use of keys for security protecting packets communicated between a wireless device and a network node. A method is performed by the wireless device. The method comprises exchanging key use information with the network node in conjunction with performing a key change procedure with the network node during which a first key is replaced with a second key. The key use information indicates which of the packets are security protected using which of the first key and the second key.
Key change procedure
There is provided mechanisms for configuring use of keys for security protecting packets communicated between a wireless device and a network node. A method is performed by the wireless device. The method comprises exchanging key use information with the network node in conjunction with performing a key change procedure with the network node during which a first key is replaced with a second key. The key use information indicates which of the packets are security protected using which of the first key and the second key.
Communication terminal, network device, communication method, and non-transitory computer readable medium
A communication terminal (10) according to the present disclosure includes: a control unit (12) configured to, in a case of a movement from a communication area formed by the 5GS to a communication area formed by the EPS or a movement from a communication area formed by the EPS to a communication area formed by the 5GS, determine whether or not a communication system forming a communication area at a movement destination can satisfy requirements of services; and a communication unit (11) configured to, when it is determined that the communication system forming the communication area at the movement destination can satisfy the requirements of the services, send a connection request message to the communication system forming the communication area at the movement destination.
Communication terminal, network device, communication method, and non-transitory computer readable medium
A communication terminal (10) according to the present disclosure includes: a control unit (12) configured to, in a case of a movement from a communication area formed by the 5GS to a communication area formed by the EPS or a movement from a communication area formed by the EPS to a communication area formed by the 5GS, determine whether or not a communication system forming a communication area at a movement destination can satisfy requirements of services; and a communication unit (11) configured to, when it is determined that the communication system forming the communication area at the movement destination can satisfy the requirements of the services, send a connection request message to the communication system forming the communication area at the movement destination.
Information transmission method, network device and terminal device
Provided are an information transmission method, a network device and a terminal device. The method comprises: a first network device obtains indication information, the indication information being used for indicating integrity protection (IP) check failure of data on a data radio bearer (DRB); the first network device sends the indication information to a second network device. In embodiments of the present application, by means of the indication information, the second network device can update a secret key of the terminal device during the IP check failure of data on the DRB, or the second network device can release RRC connection of the DRB. In this way, the potential safety hazard is eliminated, the communication security is ensured, and therefore, the success rate of data transmission is improved.