H04W12/108

Key Negotiation Method and Electronic Device
20230017263 · 2023-01-19 ·

A key negotiation method and an electronic device are provided, and relate to the field of communications technologies. Specifically, the method includes: An IoT control device multicasts, in a first local area network, a discovery message that carries a first public key, and sends a second ciphertext to a first IoT device after receiving a first ciphertext and a second public key. After receiving a third ciphertext from the first IoT device, the IoT control device decrypts the third ciphertext based on a first session key, to obtain a second signature and second session information; verifies the second signature based on a long-term public key of the first IoT device; and performs encrypted communication with the first IoT device based on the first session key after the second signature is successfully verified.

ELECTRONIC SUBSCRIBER IDENTITY MODULE TRANSFER ELIGIBILITY CHECKING
20230013030 · 2023-01-19 ·

Embodiments described herein relate to eligibility checking for transfer of one or more electronic subscriber identity modules (eSIMs) between two mobile wireless devices. Eligibility to transfer an eSIM to an eUICC of a target device can depend on whether the eUICC of the target device satisfies certain security requirements for the eSIMs to be transferred. The mobile wireless devices can obtain a transfer eligibility result based on communication with one or more network-based servers that can determine compatibility for eSIM transfer.

DATA TRANSMISSION METHOD, TERMINAL DEVICE, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
20230020533 · 2023-01-19 ·

Embodiments of the present application provide a data transmission method, a terminal device, and a non-transitory computer-readable storage medium. The method includes: receiving, by a terminal device, first configuration information, sent by a network device, and the first configuration is configured to determine configuration information of pre-configured resource, and in response to the pre-configured resource being activated, transmitting uplink data or receiving downlink data via the pre-configured resource by the terminal device. The terminal device includes a memory and a processor. The memory is configured to store a computer program, and the processor is configured to call and run the computer program stored in the memory to execute the above-mentioned data transmission method.

DATA TRANSMISSION METHOD, TERMINAL DEVICE, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
20230020533 · 2023-01-19 ·

Embodiments of the present application provide a data transmission method, a terminal device, and a non-transitory computer-readable storage medium. The method includes: receiving, by a terminal device, first configuration information, sent by a network device, and the first configuration is configured to determine configuration information of pre-configured resource, and in response to the pre-configured resource being activated, transmitting uplink data or receiving downlink data via the pre-configured resource by the terminal device. The terminal device includes a memory and a processor. The memory is configured to store a computer program, and the processor is configured to call and run the computer program stored in the memory to execute the above-mentioned data transmission method.

SECURE DISTRIBUTED RADIO ACCESS NETWORKS
20230019807 · 2023-01-19 ·

Secure, distributed radio access networks are enabled, e.g., to facilitate network resilience and security. For instance, a device can comprise a processor, and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: in response an event being determined to have occurred that affects operation of a primary radio access network, activating an alternate radio access network via a group of mobile devices and re-routing communications from being communicated via a fixed location radio access network equipment of the primary radio access network to being communicated via the group of mobile devices of the alternate radio access network.

SECURE DISTRIBUTED RADIO ACCESS NETWORKS
20230019807 · 2023-01-19 ·

Secure, distributed radio access networks are enabled, e.g., to facilitate network resilience and security. For instance, a device can comprise a processor, and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: in response an event being determined to have occurred that affects operation of a primary radio access network, activating an alternate radio access network via a group of mobile devices and re-routing communications from being communicated via a fixed location radio access network equipment of the primary radio access network to being communicated via the group of mobile devices of the alternate radio access network.

METHOD OF SETTING UP NETWORK LOCK FUNCTION OF ELECTRONIC DEVICE AND ELECTRONIC DEVICE USING THE SAME

An electronic device according to an embodiment of the disclosure may include a communication module, a subscriber identification module, and at least one processor. The at least one processor may identify identification information of the subscriber identification module stored in the subscriber identification module when the subscriber identification module is identified as being first inserted, may configure a network service provider based on the identified identification information, may generate a signature by using lock information of the subscriber identification module, may identify network lock information when the signature is identified as being valid, and may set up a network lock function of the communication module based on the identified network lock information.

NETWORK CONNECTION METHOD, TERMINAL, DEVICE TO BE CONNECTED TO NETWORK, AND STORAGE MEDIUM

– A network connection method is performed by a terminal, and the method comprises: establishing a pre-connection with a to-be-accessed device, and the to-be-accessed device being a device to access network; generating a first key pair, and sending a first public key In the first key pair to the to-be-accessed device; generating a first shared key based on the first key pair and first key negotiation information corresponding to the to-be-accessed device; encrypting network configuration information of a network device by using the first shared key, to obtain encrypted network configuration information; and sending the encrypted network configuration information to the to-be-accessed device, to allow the to-be-accessed device to decrypt the encrypted network configuration information by a second shared key, and access the network device based on the decrypted network configuration information. –

System and method for providing security services with multi-function supply chain hardware integrity for electronics defense (SHIELD)

A system and a method for a supply-chain hardware integrity for electronics defense (SHIELD) dielet embedded over a component of a device, a radio frequency identification (RFID) probe system coupled to the SHIELD dielet, and a secure server system communicating with the RFID probe system that can enable security services is provided. Embodiments include a multi-function SHIELD software defined, hardware enabled security system that provides hardware identity, anti-tamper, encryption key generation and management, trusted platform module services, and cryptographic software security services for a device.

SMART FABRIC FOR ITEM VERIFICATION AND AUTHENTICATION
20230010248 · 2023-01-12 ·

A service computing system (server) has a storage stored thereon multiple records associated with multiple items. Each item has a piece of smart fabric fixed thereon. Each record stores at least a unique identifier of a piece of smart fabric and a unique identifier of a verification and authentication device associated with the item. The server is configured to receive a verification request from a mobile device containing at least one of a unique identifier of a piece of smart fabric associated with an item, or a unique identifier of a verification and authentication device associated with the item. In response to determining that the identifier of the smart fabric or the identifier of the verification and authentication device is associated with a record, the server generates a token and causes the token to be received by the verification and authentication device, causing the verification and authentication device to transmit data associated with the token to the piece of smart fabric for authentication.