H04W12/0471

Pairing devices based on distance

Techniques disclosed herein relate to the pairing of a pairing initiator device and a pairing responder device for communication. The pairing initiator device and the pairing responder device range with each other to determine the distance between the pairing initiator device and the pairing responder device. Based on the distance being below a threshold distance, the pairing initiator device and the pairing responder device wirelessly pair with each other without further input from the user.

BLOCKCHAIN-BASED METHOD AND SYSTEM FOR SECURING A NETWORK OF VIRTUAL WIRELESS BASE STATIONS
20220405384 · 2022-12-22 ·

Disclosed is a system for securing a wireless telecommunications network that is capable of distributing licensed capacity (in the form of connection licenses) to respond to localized fluctuations in demand. The system includes a master license server and a plurality of local license servers. The local license servers are coupled to a plurality of virtual wireless base stations over a bus. Each of the local license servers has a blockchain implementation that secures the virtual wireless base stations. For example, the blockchain implementation logs each transaction in which connection licenses change ownership among the virtual wireless base stations.

KEY INFORMATION SYNCHRONIZATION METHOD AND SYSTEM, AND DEVICE
20220408247 · 2022-12-22 ·

This application provides a key information synchronization method and system, and a device, and relates to the field of communications technologies. The method includes: A terminal sends a first public key of the terminal to an IoT device; the terminal obtains a second public key of the IoT device from the IoT device; the terminal sends first key information to a hub device, where the first key information includes a first private key of the terminal, the first public key, and the second public key; the hub device uses the first private key and the first public key in the first key information as a key pair of the hub device; and the hub device performs encrypted interaction with the IoT device by using the first key information.

Providing secure communications between computing devices

Embodiments include devices and methods for providing secure communications between a first computing device and a second computing device are disclosed. A processor of the first computing device may determine in a first application software first security key establishment information. The processor may provide the first security key establishment information to a communication layer of the first computing device for transmission to the second computing device. The processor may receive, in the first application software from the communication layer of the first computing device, second security key establishment information received from the second computing device. The processor may determine a first security key by the first application software based at least in part on the second security key establishment information. The processor may provide the first security key to the communication layer for protecting messages from the first application software to the second computing device.

Trusted Location Tracking
20220400383 · 2022-12-15 ·

In accordance with some embodiments, an apparatus that enables trusted location tracking includes a housing arranged to hold a user equipment, one or more devices, a local communication device, and a controller at least partially supported by the housing. The apparatus obtains, via the one or more devices, a first set of data characterizing a location of the user equipment. The apparatus further establishes, via the location communication device, a local communication channel with the user equipment. The apparatus also obtains through the local communication channel a second set of data characterizing the location of the user equipment. The apparatus also determines a trust score characterizing the second set of data based on the first set of data. The apparatus additionally triggers an alert in accordance with a determination that the trust score is below a threshold.

Trusted Location Tracking
20220400383 · 2022-12-15 ·

In accordance with some embodiments, an apparatus that enables trusted location tracking includes a housing arranged to hold a user equipment, one or more devices, a local communication device, and a controller at least partially supported by the housing. The apparatus obtains, via the one or more devices, a first set of data characterizing a location of the user equipment. The apparatus further establishes, via the location communication device, a local communication channel with the user equipment. The apparatus also obtains through the local communication channel a second set of data characterizing the location of the user equipment. The apparatus also determines a trust score characterizing the second set of data based on the first set of data. The apparatus additionally triggers an alert in accordance with a determination that the trust score is below a threshold.

TECHNIQUES FOR AUTHENTICATING BUILDING/ROOM ACCESS TERMINALS
20220392286 · 2022-12-08 ·

The techniques described herein provide for authentication of a reader device over a wireless protocol (e.g., NFC or Bluetooth, BLE). The mobile device can receive and store the static public key of the reader device and one or more credentials, each credential specifying access to an electronic lock. The mobile device can receive an ephemeral reader public key, a reader identifier, and a transaction identifier. The mobile device can generate session key using the ephemeral mobile private key and the ephemeral reader public key and send the ephemeral mobile public key to the reader device. The reader device can receive the ephemeral mobile public key and sign and transmit a signature message to the mobile device. The mobile device can validate a reader signature and generate an encrypted credential that the reader can use to access an electronic lock. The reader device can authenticate the mobile device for mutual authentication.

DYNAMIC KEY EXCHANGE FOR MOVING TARGET
20220394465 · 2022-12-08 ·

Low power devices are able to utilize encryption in communication. Low power devices typically cannot send/receive large amounts of data since sending/receiving more data uses more power. Implementing a key exchange with a small encrypted payload enables secure communication between the devices. A one-way data stream is implemented. The one-way data stream is able to be encrypted. The dynamic key exchange is able to be used for a moving target.

DYNAMIC KEY EXCHANGE FOR MOVING TARGET
20220394465 · 2022-12-08 ·

Low power devices are able to utilize encryption in communication. Low power devices typically cannot send/receive large amounts of data since sending/receiving more data uses more power. Implementing a key exchange with a small encrypted payload enables secure communication between the devices. A one-way data stream is implemented. The one-way data stream is able to be encrypted. The dynamic key exchange is able to be used for a moving target.

KEY EXCHANGE WITH SMALL ENCRYPTED PAYLOAD
20220394464 · 2022-12-08 ·

Low power devices are able to utilize encryption in communication. Low power devices typically cannot send/receive large amounts of data since sending/receiving more data uses more power. Implementing a key exchange with a small encrypted payload enables secure communication between the devices.