Patent classifications
H04W12/108
Information processing device, information processing system, and method for controlling information processing device including comparing request order information and order comparison information
An information processing device updates its own secret key according to an update request including request order information, the information processing device being provided with: a storage unit that stores, in a nonvolatile manner, a master secret key, a secret key, and order comparison information that enables comparison of the request order of the update request; and an update unit that, in a case where the update request has been made, compares the request order information and the order comparison information, and in a case where it has been determined that the order of the update request is authorized, updates the order comparison information to information corresponding to the request order information before update processing of the secret key is performed by using the master secret key.
Vehicle messaging
A central computer includes a first processor and a first memory. A portable computer includes a second processor and a second memory. The portable computer is programmed to: obtain an identifier of a vehicle via a scanner included in the portable computer, and transmit the identifier and first validation data to the central computer, and transmit a message to the central computer for a destination computer. The central computer is programmed to receive the identifier and the first validation data from the portable computer, determine second validation data; identify a destination computer based on the identifier, and upon determining that a comparison of the first validation data and the second validation data meets a specified criterion, transmit the message from the portable computer to the destination computer.
Vehicle messaging
A central computer includes a first processor and a first memory. A portable computer includes a second processor and a second memory. The portable computer is programmed to: obtain an identifier of a vehicle via a scanner included in the portable computer, and transmit the identifier and first validation data to the central computer, and transmit a message to the central computer for a destination computer. The central computer is programmed to receive the identifier and the first validation data from the portable computer, determine second validation data; identify a destination computer based on the identifier, and upon determining that a comparison of the first validation data and the second validation data meets a specified criterion, transmit the message from the portable computer to the destination computer.
Protection of Resume Request Messages
Embodiments are presented herein of apparatuses, systems, and methods for a user equipment device (UE) and/or cellular network to resume a connection. To resume the connection, the UE may transmit a fully protected connection resume message, e.g., which may include protection for a resume cause field.
METHOD, MANAGEMENT SERVER, AND BASE STATION FOR DEFENDING ATTACK FROM FAKE BASE STATION IN COMMUNICATION NETWORK
A base station of a communication system may include an antenna; a memory; and a processor. The processor analyzes a signal received through the antenna to determine if the received signal is a signal transmitted from a fake base station. Based on a determination that the source of the received signal is the fake base station, the processor generates a random access preamble signal for accessing the fake base station. The processor transmits the generated random access preamble signal through the antenna. Thus, the base station may effectively defend against an attack from a fake base station by detecting the fake base station based on collected information of a neighboring base station and causing radio resources of the detected fake base station to be exhausted. Various other embodiments are possible.
METHOD, MANAGEMENT SERVER, AND BASE STATION FOR DEFENDING ATTACK FROM FAKE BASE STATION IN COMMUNICATION NETWORK
A base station of a communication system may include an antenna; a memory; and a processor. The processor analyzes a signal received through the antenna to determine if the received signal is a signal transmitted from a fake base station. Based on a determination that the source of the received signal is the fake base station, the processor generates a random access preamble signal for accessing the fake base station. The processor transmits the generated random access preamble signal through the antenna. Thus, the base station may effectively defend against an attack from a fake base station by detecting the fake base station based on collected information of a neighboring base station and causing radio resources of the detected fake base station to be exhausted. Various other embodiments are possible.
BLOCKCHAIN-BASED METHOD AND SYSTEM FOR SECURING A NETWORK OF VIRTUAL WIRELESS BASE STATIONS
Disclosed is a system for securing a wireless telecommunications network that is capable of distributing licensed capacity (in the form of connection licenses) to respond to localized fluctuations in demand. The system includes a master license server and a plurality of local license servers. The local license servers are coupled to a plurality of virtual wireless base stations over a bus. Each of the local license servers has a blockchain implementation that secures the virtual wireless base stations. For example, the blockchain implementation logs each transaction in which connection licenses change ownership among the virtual wireless base stations.
AUTOMATIC ASSOCIATION OF A NON-MEDICAL DEVICE WITH A MEDICAL DEVICE
Techniques disclosed herein relate to automatic association of a non-medical device with a medical device. In some embodiments, the techniques involve accessing a user account provided by a cloud-based service, retrieving first identification information that is stored to the user account and identifies a medical device via the cloud-based service, receiving second identification information from the medical device, and establishing a secure communication link with the medical device based on determining that the second identification information corresponds to or matches the first identification information.
BLUETOOTH LOW ENERGY (BLE) ADVERTISING PACKET SECURITY
Secure pairing of computing devices, such as a field tool and a battery-powered device (BPD), may include generating by the BPD a challenge message including a randomly-generated challenge, and receiving at the field tool a challenge message from the BPD via a Bluetooth low-energy (BLE) advertisement message. The challenge message can include a randomly-generated challenge and can be issued in a scannable undirected advertising message. The challenge key can be calculated via a secure hash algorithm (SHA) to obtain a response solution. The response solution can be sent by the field tool to the advertising device in response to the challenge message. The response solution can be verified by the BPD using a cryptographic message authentication code such as an HMAC, and the BPD sends a confirmation message to the field tool indicating that the response solution is verified as correct.
Method and system for IoT code and configuration using smart contracts
Method and Systems for configuring, monitoring, updating and validating Internet of Things (IoT) software code and configuration using blockchain smart contract technology. The use of smart contracts for delivering software code and or configuration scripts to IoT devices is an enhanced cybersecurity solution meant to ensure the security and integrity of IoT devices. The use of smart contracts is also shown how it can be used for verifying the integrity of the IoT devices software code and or configuration is a proactive method of cybersecurity. The proactive cybersecurity method will prevent man in the middle attacks as well as preventing rogue devices from impacting other IoT devices or networks.