Patent classifications
H04W12/69
Network identifier and authentication information generation for building automation system controllers
Generating network identifier information and authentication information for wireless communication with a controller includes accessing, by the controller, identity information associated with the controller. The controller obfuscates the identity information and generates the network identifier information and the authentication information associated with the controller using the obfuscated identity information. The controller is configured for wireless communication using the generated network identifier information and the generated authentication information.
PREVENTING WIRELESS CONNECTIONS TO AN UNAUTHORIZED ACCESS POINT ON A DATA COMMUNICATION NETWORK USING NAV VALUES
Broadcasts of a probe request are detected from a wireless station with the MAC address for an unauthorized access point in order to begin association between the wireless station and the unauthorized access point. Responsive to the probe request detection, a spoofed probe response is transmitted including a MAC address of the unauthorized access point to the station to appear as if sent by the unauthorized access point. The probe response includes a NAV element and the MAC address of the unauthorized access point, the NAV element set at a value high enough to prevent the station from transmitting to the unauthorized access point during a period.
PREVENTING WIRELESS CONNECTIONS TO AN UNAUTHORIZED ACCESS POINT ON A DATA COMMUNICATION NETWORK USING NAV VALUES
Broadcasts of a probe request are detected from a wireless station with the MAC address for an unauthorized access point in order to begin association between the wireless station and the unauthorized access point. Responsive to the probe request detection, a spoofed probe response is transmitted including a MAC address of the unauthorized access point to the station to appear as if sent by the unauthorized access point. The probe response includes a NAV element and the MAC address of the unauthorized access point, the NAV element set at a value high enough to prevent the station from transmitting to the unauthorized access point during a period.
5G NAS DECIPHERING ENHANCE RATE OF CONVERGENCE MECHANISM
An illustrative embodiment disclosed herein is a non-transitory computer readable medium. In some aspects, the non-transitory computer readable medium includes instructions for providing a mobile user monitoring solution that, when executed by a processor, cause the processor to capture a transaction transmitted over an N12 interface, extract, from the transaction, one of an expected response (XRES) or an authentication token (AUTN), a user identifier (ID), and a cipher key, capture a first message transmitted over an N1 interface, and determine that the first message is associated with the user ID and the cipher key extracted from the transaction.
5G NAS DECIPHERING ENHANCE RATE OF CONVERGENCE MECHANISM
An illustrative embodiment disclosed herein is a non-transitory computer readable medium. In some aspects, the non-transitory computer readable medium includes instructions for providing a mobile user monitoring solution that, when executed by a processor, cause the processor to capture a transaction transmitted over an N12 interface, extract, from the transaction, one of an expected response (XRES) or an authentication token (AUTN), a user identifier (ID), and a cipher key, capture a first message transmitted over an N1 interface, and determine that the first message is associated with the user ID and the cipher key extracted from the transaction.
Vehicle messaging
A central computer includes a first processor and a first memory. A portable computer includes a second processor and a second memory. The portable computer is programmed to: obtain an identifier of a vehicle via a scanner included in the portable computer, and transmit the identifier and first validation data to the central computer, and transmit a message to the central computer for a destination computer. The central computer is programmed to receive the identifier and the first validation data from the portable computer, determine second validation data; identify a destination computer based on the identifier, and upon determining that a comparison of the first validation data and the second validation data meets a specified criterion, transmit the message from the portable computer to the destination computer.
Vehicle messaging
A central computer includes a first processor and a first memory. A portable computer includes a second processor and a second memory. The portable computer is programmed to: obtain an identifier of a vehicle via a scanner included in the portable computer, and transmit the identifier and first validation data to the central computer, and transmit a message to the central computer for a destination computer. The central computer is programmed to receive the identifier and the first validation data from the portable computer, determine second validation data; identify a destination computer based on the identifier, and upon determining that a comparison of the first validation data and the second validation data meets a specified criterion, transmit the message from the portable computer to the destination computer.
Methods for Access Security at Operation and Maintenance, O&M, Support
The present disclosure relates to a service terminal, a network device and a method for access security at Operation and Maintenance, O&M, support of the network device. The network device (100) and the service terminal (20) are configured to establish a communication using at least one access setting for establishing a communication. The at least one access setting comprising one of the following: an IP address, one or several serial communication parameters, access protocol, authentication method. The method comprises to receive a trigger for changing the at least one access setting for establishing a communication with the service terminal, and to change the at least one access setting for establishing the communication with the service terminal to at least one new access setting.
COMMUNICATION METHOD, APPARATUS, AND SYSTEM
The present disclosure relates to communication methods, apparatus, and systems. In one example method, a network slice selection network element sends identification information of a first slice to a mobility management network element. The network slice selection network element receives a slice authentication result corresponding to the first slice from the mobility management network element. If the slice authentication result corresponding to the first slice indicates that slice authentication succeeds, the network slice selection network element performs user counting on the first slice. The network slice selection network element determines, based on a user counting result corresponding to the first slice, whether to allow a terminal device to access the first slice.
KEY EXCHANGE WITH SMALL ENCRYPTED PAYLOAD
Low power devices are able to utilize encryption in communication. Low power devices typically cannot send/receive large amounts of data since sending/receiving more data uses more power. Implementing a key exchange with a small encrypted payload enables secure communication between the devices.