H04W12/0431

Access rejection method, apparatus and system, and storage medium and processor
11716673 · 2023-08-01 · ·

Disclosed are an access rejection method, apparatus and system, where the access rejection method includes: a first base station receives an access request from a terminal; and the first base station sends an access rejection message to the terminal; where the access rejection message at least carries: a check value generated based on a key of the terminal and at least part of contents of the access rejection message. And further disclosed are related computer storage media and processors.

Access rejection method, apparatus and system, and storage medium and processor
11716673 · 2023-08-01 · ·

Disclosed are an access rejection method, apparatus and system, where the access rejection method includes: a first base station receives an access request from a terminal; and the first base station sends an access rejection message to the terminal; where the access rejection message at least carries: a check value generated based on a key of the terminal and at least part of contents of the access rejection message. And further disclosed are related computer storage media and processors.

System for identification of secure wireless network access points using cryptographic pre-shared keys
11716622 · 2023-08-01 · ·

A system is provided for identification of secure wireless network access points using cryptographic pre-shared keys. In particular, the system may comprise a client-side application that may use a pre-shared key to generate a list of valid access point ID's in a pseudorandom manner. A server-side application may use the same pre-shared key to generate one or more access point ID's. Based on the pre-shared key, a client computing device may readily identify which wireless access points within the network are secure and trusted.

System for identification of secure wireless network access points using cryptographic pre-shared keys
11716622 · 2023-08-01 · ·

A system is provided for identification of secure wireless network access points using cryptographic pre-shared keys. In particular, the system may comprise a client-side application that may use a pre-shared key to generate a list of valid access point ID's in a pseudorandom manner. A server-side application may use the same pre-shared key to generate one or more access point ID's. Based on the pre-shared key, a client computing device may readily identify which wireless access points within the network are secure and trusted.

MACHINE TO MACHINE COMMUNICATION ACCELERATION VIA ENCRYPTION BYPASS
20230239692 · 2023-07-27 ·

The disclosed technology provides systems and methods for accelerating communication for low latency, high reliability, and secure machine control systems through encryption bypass. Machine controllers, e.g., drone, robot, or autonomous-vehicle controllers, establish a hardware-based trust relationship with the controlled machines allowing for the communication of unencrypted low-latency control and data messages, for example, via ultra-reliable low latency (URLLC) cellular network slices. The machines can relay non-mission-critical communications via encrypted communication using different network slices. The machines can also use distributed ledgers to store and access events and records used to create and/or maintain the trust relationship, and archive data for subsequent use.

MACHINE TO MACHINE COMMUNICATION ACCELERATION VIA ENCRYPTION BYPASS
20230239692 · 2023-07-27 ·

The disclosed technology provides systems and methods for accelerating communication for low latency, high reliability, and secure machine control systems through encryption bypass. Machine controllers, e.g., drone, robot, or autonomous-vehicle controllers, establish a hardware-based trust relationship with the controlled machines allowing for the communication of unencrypted low-latency control and data messages, for example, via ultra-reliable low latency (URLLC) cellular network slices. The machines can relay non-mission-critical communications via encrypted communication using different network slices. The machines can also use distributed ledgers to store and access events and records used to create and/or maintain the trust relationship, and archive data for subsequent use.

SYSTEM FOR IDENTIFICATION OF SECURE WIRELESS NETWORK ACCESS POINTS USING CRYPTOGRAPHIC PRE-SHARED KEYS
20230023649 · 2023-01-26 · ·

A system is provided for identification of secure wireless network access points using cryptographic pre-shared keys. In particular, the system may comprise a client-side application that may use a pre-shared key to generate a list of valid access point ID's in a pseudorandom manner. A server-side application may use the same pre-shared key to generate one or more access point ID's. Based on the pre-shared key, a client computing device may readily identify which wireless access points within the network are secure and trusted.

SYSTEM FOR IDENTIFICATION OF SECURE WIRELESS NETWORK ACCESS POINTS USING CRYPTOGRAPHIC PRE-SHARED KEYS
20230023649 · 2023-01-26 · ·

A system is provided for identification of secure wireless network access points using cryptographic pre-shared keys. In particular, the system may comprise a client-side application that may use a pre-shared key to generate a list of valid access point ID's in a pseudorandom manner. A server-side application may use the same pre-shared key to generate one or more access point ID's. Based on the pre-shared key, a client computing device may readily identify which wireless access points within the network are secure and trusted.

SUPPORTING REMOTE UNIT REAUTHENTICATION

Apparatuses, methods, and systems are disclosed for supporting remote unit reauthentication. One apparatus includes a network interface that receives a first authentication message for reauthenticating a remote unit and a processor that verifies a first domain-name. The first domain-name identifies a key management domain name and an associated gateway function holding a reauthentication security context. Here, the first authentication message includes a NAI containing a first username and the first domain-name. The processor validates the first authentication message using at least the first username and generates a second authentication message in response to successfully validating the first authentication message. Via the network interface, the processor responds to the first authentication message by sending the second authentication message.

MULTI-PLMN MUSIM FOR TELECOMMUNICATION SYSTEMS

There is provided an apparatus, said apparatus comprising at least one processor and at least one memory including a computer program code, the at least one memory and computer program code configured to, with the at least one processor, cause the apparatus at least to: at a user equipment, the user equipment having a first universal subscriber identity module, USIM, associated with a first network and at least one second USIM associated with a second network, provide an indication from the at least one second USIM to the second network that paging notifications for the second network are to be provided to the first USIM of the user equipment via the first network, receive a paging notification for the second network at the first USIM of the user equipment via the first network and provide the paging notification from the first USIM to the second USIM in the user equipment.