H04W12/0471

COMMUNICATION APPARATUS, CONTROL METHOD, AND COMPUTER-READABLE STORAGE MEDIUM
20230030588 · 2023-02-02 ·

A communication apparatus performs short range wireless communication, performs a second communication different from the short range wireless communication, detects, by using the short range wireless communication, a partner apparatus with which sharing processing for sharing a communication parameter used for joining a network is to be performed, and obtains, from the partner apparatus detected, a public key by using the second communication. Authentication processing with the partner apparatus is executed by using the public key obtained, and in a case where the authentication processing succeeds, the sharing processing with the partner apparatus is executed.

COMMUNICATION APPARATUS, CONTROL METHOD, AND COMPUTER-READABLE STORAGE MEDIUM
20230030588 · 2023-02-02 ·

A communication apparatus performs short range wireless communication, performs a second communication different from the short range wireless communication, detects, by using the short range wireless communication, a partner apparatus with which sharing processing for sharing a communication parameter used for joining a network is to be performed, and obtains, from the partner apparatus detected, a public key by using the second communication. Authentication processing with the partner apparatus is executed by using the public key obtained, and in a case where the authentication processing succeeds, the sharing processing with the partner apparatus is executed.

MATCHING AN USER TAKEN IMAGE WITH ACCESS CONTROL APPARATUS REFERENCES FOR PHYSICAL ACCESS CONTROL
20230030707 · 2023-02-02 ·

It is provided a method for enabling access control for access to a physical space secured by a lock device. The method is performed in a security device and comprises the steps of: obtaining at least one image captured using a first camera of a portable key device, the at least one image being captured in a vicinity of the lock device; receiving a template decryption key from a lock device over a short-range communication link; obtaining a credential associated with the lock device; matching the at least one image with a plurality of templates, each template being associated with a lock device, which comprises obtaining the plurality of templates by decrypting encrypted templates using the template decryption key; and wherein a positive match is a necessary condition for opening the lock device.

EFFICIENT WIRELESS PUBLIC KEY EXCHANGE
20230096692 · 2023-03-30 ·

A facility operating in a first mobile communication device (MCD) is described. The facility generates a key pair made up of a private key and a public key for use by the first MCD in communicating with other MCDs. The public key has information content. The facility constructs a first public key component and a second public key component, that each encode an incomplete portion of the information content of the public key; and that collectively encode the complete information content of the public key. The facility transmits a wireless message for receipt by other MCDs; it has (1) first contents that identify the wireless message as a notification signal, and (2) as second contents, the first public key component. The second contents are located at a position in the first wireless message that identifies the second contents as the node ID of the first MCD.

DEVICE SHARING METHOD AND ELECTRONIC DEVICE
20230037251 · 2023-02-02 ·

A first device obtains a public key of a first home device and a first message leaving key that is used to encrypt an offline message between the first device and the first home device; obtains a public key of a second device and a second message leaving key that is used to encrypt an offline message between the first device and the second device; obtains a third message leaving key used to encrypt an offline message between the second device and the first home device; encrypts the public key of the second device and the third message leaving key by using the first message leaving key, to obtain first encrypted information, and requests a server to push the first encrypted information to the first home device; and encrypts the public key of the first home device and the third message leaving key by using the second message leaving key.

Method enabling migration of a subscription

A method enabling migration of a subscription from a source device to a destination device is disclosed. The method may be performed in a migration entity and comprises: receiving, from the source device, a confirmation of a first profile associated with the subscription having been deleted in the source device, securing a second profile associated with the subscription to be provisioned onto the eUICC of the destination device, wherein at least one piece of subscription information is the same for the first and second profiles, and providing an activation code for use in migration of the subscription to the destination device. A method in a source device, migration entity, source device, computer programs and computer program products are also provided.

Method enabling migration of a subscription

A method enabling migration of a subscription from a source device to a destination device is disclosed. The method may be performed in a migration entity and comprises: receiving, from the source device, a confirmation of a first profile associated with the subscription having been deleted in the source device, securing a second profile associated with the subscription to be provisioned onto the eUICC of the destination device, wherein at least one piece of subscription information is the same for the first and second profiles, and providing an activation code for use in migration of the subscription to the destination device. A method in a source device, migration entity, source device, computer programs and computer program products are also provided.

Loading security information with restricted access
11617086 · 2023-03-28 · ·

An approach for providing security information to a device to enable the device to secure end-to-end data communication with an end server. The security information is downloaded to a SIM of the device in response to an authentication message issued by the device. The security information is secured within the SIM so that it can only be accessed/interpreted using a first key associated with the device. The securing is performed based on identity data, identifying the device or components thereof, contained in the authentication message.

Loading security information with restricted access
11617086 · 2023-03-28 · ·

An approach for providing security information to a device to enable the device to secure end-to-end data communication with an end server. The security information is downloaded to a SIM of the device in response to an authentication message issued by the device. The security information is secured within the SIM so that it can only be accessed/interpreted using a first key associated with the device. The securing is performed based on identity data, identifying the device or components thereof, contained in the authentication message.

COMMUNICATION APPARATUS, COMMUNICATION METHOD, AND STORAGE MEDIUM
20230087387 · 2023-03-23 ·

A communication apparatus capable of performing multilink communication conforming to the IEEE802.11 standard series, the communication apparatus includes an establishment unit configured to establish a link with another communication apparatus, and a first sharing unit configured to share, in a case where the establishment unit establishes a first link and a second link between the communication apparatus and the another communication apparatus, a PTK (Pairwise Transient Key) for encryption of unicast communication by 4 Way Handshake processing that is performed with the another communication apparatus in the first link, wherein, in the second link, the PTK is used to encrypt unicast communication in the second link without performing the 4 Way Handshake processing.