H04W12/0471

Key change procedure

There is provided mechanisms for configuring use of keys for security protecting packets communicated between a wireless device and a network node. A method is performed by the wireless device. The method comprises exchanging key use information with the network node in conjunction with performing a key change procedure with the network node during which a first key is replaced with a second key. The key use information indicates which of the packets are security protected using which of the first key and the second key.

Key change procedure

There is provided mechanisms for configuring use of keys for security protecting packets communicated between a wireless device and a network node. A method is performed by the wireless device. The method comprises exchanging key use information with the network node in conjunction with performing a key change procedure with the network node during which a first key is replaced with a second key. The key use information indicates which of the packets are security protected using which of the first key and the second key.

First network node, second network node, wireless device and methods therein for handling broadcast information

A method for handling broadcast information is described. A first network node (111) operating in a wireless communications network (100) determines (403) one or more decryption keys (K1, K2, K3) to be provided to a wireless device (131) in the wireless communications network (100). The decryption keys enable the wireless device (131) to decrypt information to be broadcasted by a second network node (112) in the wireless communications network (100). The information comprises a plurality of subsets of positioning information. Each of the subsets is to be, or is, encrypted with a different encryption key based on a respective type of subscription for wireless devices (131, 132, 133) in the wireless communications network (100). The determined decryption keys are based on at least one type of subscription of the wireless device (131). The first network node (111) then initiates (404) providing the determined to the wireless device (131).

First network node, second network node, wireless device and methods therein for handling broadcast information

A method for handling broadcast information is described. A first network node (111) operating in a wireless communications network (100) determines (403) one or more decryption keys (K1, K2, K3) to be provided to a wireless device (131) in the wireless communications network (100). The decryption keys enable the wireless device (131) to decrypt information to be broadcasted by a second network node (112) in the wireless communications network (100). The information comprises a plurality of subsets of positioning information. Each of the subsets is to be, or is, encrypted with a different encryption key based on a respective type of subscription for wireless devices (131, 132, 133) in the wireless communications network (100). The determined decryption keys are based on at least one type of subscription of the wireless device (131). The first network node (111) then initiates (404) providing the determined to the wireless device (131).

Communication apparatus, control method, and computer-readable storage medium
11553349 · 2023-01-10 · ·

A communication apparatus receives a signal that is transmitted from a partner apparatus using a first communication scheme, and establishes, on the basis that the signal received includes information indicating that parameter exchange processing is to be executed, a connection with the partner apparatus using a second communication scheme, wherein the second communication scheme has a higher communication rate and consumes more power than the first communication scheme. In addition, the communication apparatus exchanges, by using the second communication scheme, information to be used in communication for the parameter exchange processing with the partner apparatus, and executes the parameter exchange processing using the information by using the second communication unit scheme.

Communication apparatus, control method, and computer-readable storage medium
11553349 · 2023-01-10 · ·

A communication apparatus receives a signal that is transmitted from a partner apparatus using a first communication scheme, and establishes, on the basis that the signal received includes information indicating that parameter exchange processing is to be executed, a connection with the partner apparatus using a second communication scheme, wherein the second communication scheme has a higher communication rate and consumes more power than the first communication scheme. In addition, the communication apparatus exchanges, by using the second communication scheme, information to be used in communication for the parameter exchange processing with the partner apparatus, and executes the parameter exchange processing using the information by using the second communication unit scheme.

Protection of the UE identity during 802.1x carrier hotspot and wi-fi calling authentication

This disclosure relates to techniques for performing Wi-Fi authentication in a wireless communication system. Public key cryptography may be used to enhance the confidentiality of the user's permanent identity in transit. In some embodiments, a RSA-OAEP(SHA-256) encryption scheme may be used to protect the permanent identity when the EAP client needs to send the user's permanent identity to the server in the absence of pseudonym or fast re-authentication identity. In some embodiments, a server certificate is used to authenticate a iWLAN tunnel to protect an IMSI during setup of a Wi-Fi call. Using the methods described herein on both or either of the EAP client and server side may offer improved privacy protection.

Protection of the UE identity during 802.1x carrier hotspot and wi-fi calling authentication

This disclosure relates to techniques for performing Wi-Fi authentication in a wireless communication system. Public key cryptography may be used to enhance the confidentiality of the user's permanent identity in transit. In some embodiments, a RSA-OAEP(SHA-256) encryption scheme may be used to protect the permanent identity when the EAP client needs to send the user's permanent identity to the server in the absence of pseudonym or fast re-authentication identity. In some embodiments, a server certificate is used to authenticate a iWLAN tunnel to protect an IMSI during setup of a Wi-Fi call. Using the methods described herein on both or either of the EAP client and server side may offer improved privacy protection.

Dialysis machine, a fluid preparation device, and methods for establishing secure communication between a dialysis machine and a fluid preparation device

The present disclosure relates to establishing secure communication between a dialysis machine and a fluid preparation device. In an example, a dialysis machine includes a control unit configured to establish a short-range wireless connection with an external fluid preparation device. The control unit establishes the short-range wireless connection by causing a user interface to display a prompt to enter a passkey associated with a fluid preparation device, using the received passkey to pair with the fluid preparation device, and creating a new bonding table or write to an empty bonding table using the passkey. The control unit is also configured to generate a shared key using the passkey and at least one predetermined criterion and use the shared key to authenticate with the fluid preparation device. When authentication with the fluid preparation device is successful, the control unit enables data communication using the short-range connection with the fluid preparation device.

SYSTEMS AND METHODS FOR CONNECTING A PUBLIC DEVICE TO A PRIVATE DEVICE WITH PRE-INSTALLED CONTENT MANAGEMENT APPLICATIONS
20250233861 · 2025-07-17 ·

Systems and methods for providing access to media content by connecting, to a public device, a private device that has an installed application associated with the media content. A media guidance application may receive a communication from a private device, running a private interface application, requesting to access content using the public device. In response, the media guidance application may retrieve, at the public device, a public interface application associated with the private interface application, from a content provider of the content. The private interface application may be configured to control a graphical user interface of the public interface application. Accordingly, the user may be able to access content via the public device when the private device is within a predetermined proximity to the public device.