H04W12/108

Method and apparatus for negotiating security during handover between different radio access technologies
11576089 · 2023-02-07 · ·

A solution for security negotiation during handover of a user equipment (UE) between different radio access technologies is provided. In the solution, the UE receives non-access stratum (NAS) security information and access stratum (AS) security information which are selected by the target system and then performs security negotiation with the target system according to the received NAS security information and AS security information. As such, the UE may obtain the key parameter information of the NAS and AS selected by a Long Term Evolution (LTE) system and perform security negotiation with the LTE system when the UE hands over from a different system, such as a Universal Terrestrial Radio Access Network (UTRAN), to the LTE system.

Method and apparatus for negotiating security during handover between different radio access technologies
11576089 · 2023-02-07 · ·

A solution for security negotiation during handover of a user equipment (UE) between different radio access technologies is provided. In the solution, the UE receives non-access stratum (NAS) security information and access stratum (AS) security information which are selected by the target system and then performs security negotiation with the target system according to the received NAS security information and AS security information. As such, the UE may obtain the key parameter information of the NAS and AS selected by a Long Term Evolution (LTE) system and perform security negotiation with the LTE system when the UE hands over from a different system, such as a Universal Terrestrial Radio Access Network (UTRAN), to the LTE system.

Method and System for IoT Code and Configuration using Smart Contracts
20230100342 · 2023-03-30 ·

Method and Systems for configuring, monitoring, updating and validating Internet of Things (IoT) software code and configuration using blockchain smart contract technology. The use of smart contracts for delivering software code and or configuration scripts to IoT devices is an enhanced cybersecurity solution meant to ensure the security and integrity of IoT devices. The use of smart contracts is also shown how it can be used for verifying the integrity of the IoT devices software code and or configuration is a proactive method of cybersecurity. The proactive cybersecurity method will prevent man in the middle attacks as well as preventing rogue devices from impacting other IoT devices or networks.

Method and System for IoT Code and Configuration using Smart Contracts
20230100342 · 2023-03-30 ·

Method and Systems for configuring, monitoring, updating and validating Internet of Things (IoT) software code and configuration using blockchain smart contract technology. The use of smart contracts for delivering software code and or configuration scripts to IoT devices is an enhanced cybersecurity solution meant to ensure the security and integrity of IoT devices. The use of smart contracts is also shown how it can be used for verifying the integrity of the IoT devices software code and or configuration is a proactive method of cybersecurity. The proactive cybersecurity method will prevent man in the middle attacks as well as preventing rogue devices from impacting other IoT devices or networks.

A MECHANISM FOR UNMANNED VEHICLE AUTHORIZATION FOR OPERATION OVER CELLULAR NETWORKS
20230102300 · 2023-03-30 ·

Methods, systems, and devices for wireless communications are described. A wireless network may receive a message from a wireless device that is coupled with an aerial vehicle. The message may include a network identifier, an aerial identifier, and operational information for the aerial vehicle. The wireless network may send a message to an aerial function management system requesting that the aerial function management system authenticate an identity of the aerial vehicle. The wireless network may also request that the aerial function management system approve a flight path for the aerial vehicle. The wireless network may establish a data session with the wireless device based on an authentication of the aerial vehicle and an approval of the flight path.

A MECHANISM FOR UNMANNED VEHICLE AUTHORIZATION FOR OPERATION OVER CELLULAR NETWORKS
20230102300 · 2023-03-30 ·

Methods, systems, and devices for wireless communications are described. A wireless network may receive a message from a wireless device that is coupled with an aerial vehicle. The message may include a network identifier, an aerial identifier, and operational information for the aerial vehicle. The wireless network may send a message to an aerial function management system requesting that the aerial function management system authenticate an identity of the aerial vehicle. The wireless network may also request that the aerial function management system approve a flight path for the aerial vehicle. The wireless network may establish a data session with the wireless device based on an authentication of the aerial vehicle and an approval of the flight path.

ELECTRONIC DEVICE FOR PERFORMING EDGE COMPUTING SERVICE, AND OPERATING METHOD OF ELECTRONIC DEVICE

An electronic device and an operating method of an electronic device are provided. The electronic device receives, from a first server, access information about a second server for accessing the second server, receives access information about a third server from the second server accessed based on the access information about the second server, in response to a service connection request using the third server of an application, checks the validity of the application based on data for verifying the validity of the application included in the access information about the third server, and performs the service by accessing the third server based on the result of identifying the validity of the application.

CROSS PLATFORM CREDENTIAL SHARING

The present application relates to devices and components including apparatus, systems, and methods to share a credential for accessing a secured entity between an origination device and a recipient device. In some embodiments, the sharing may be cross platform where the recipient device executes a different platform than the origination device.

LIGHT FIDELITY TRANSMISSION NETWORK SECURED WITH FRICTIONLESS AGENT-CENTRIC AUTHENTICATION DATA CHAINS
20220352983 · 2022-11-03 ·

Aspects of this disclosure relate to utilizing a 360-degree light source and frictionless authentication methods to provide access to a secure network and associated services. Data transmission is conducted via a light source that is also used to illuminate a location. An agent-centric method of frictionless data authentication and transfer is applied. The agent-centric authentication methods may be power efficient for use in connection with a mobile device having limited battery capacity and limited bandwidth.

MULTIFACTOR AUTHENTICATION THROUGH CRYPTOGRAPHY-ENABLED SMART CARDS
20220353084 · 2022-11-03 ·

There are provided systems and methods for multifactor authentication through cryptography-enabled smart cards. A user may engage in transactions or other online interactions that may require multifactor authentication, such as by providing a secondary or further piece of evidence or information that is used to more securely trust the user and that they are not another malicious user. The user may utilize a physical card that includes a microchip embedded to a surface, where the microchip includes a key or other cryptographic signing function to be able to be scanned and digitally sign a request for authentication from a computing device. A user's computing device may then be brought into close proximity to the microchip when a request to scan the card's microchip is received. The user's computing device may then use wireless signals to activate the microchip and perform a multifactor authentication.