H04W12/71

System and method of dynamic and scalable IoT framework

A method and a system for providing one or more services to one or more user devices [202] in an IoT network in a scalable M2M (Machine to Machine) framework. The method comprises receiving a connection request from the one or more user devices [202] at a load balance of the IoT network, the connection request comprises at least a username comprising a cluster identifier. The load balancer [204] determines a cluster identifier based on the connection request and identifies at least one target cluster from the one or more clusters [206], said target cluster being associated with the identifier cluster identifier. The load balancer [204] routes the connection request to the at least one target cluster to provide the one or more services to the one or more user devices [202].

System and Method for Performing Identity Management

A method of verifying an identity of a wireless device. The method comprising receiving a calling station identity from a SIM of a wireless device, receiving a secure identifier derived by a secure element of the wireless device, comparing the received calling station identity to calling station identities of authorized wireless devices to identify obtain a corresponding wireless device identity, confirming whether the secure identifier is authentic and determining a second wireless device identity from the secure identifier, and comparing the first wireless device identity and the second wireless device identity to verify the identity of the wireless device.

Connecting a Remote User Equipment to a Cellular Network
20230011576 · 2023-01-12 ·

There is provided a performed by a first node for use in connecting a remote user equipment (UE) to a cellular network. An identity of the remote UE is acquired (102). A cryptographic function is applied (104) to the identity of the remote UE to generate a string identity for the remote UE. The string identity for the remote UE is stored (106) in a memory with the identity of the remote UE for use in connecting the remote UE to the cellular network via a relay UE connected to the cellular network.

Connecting a Remote User Equipment to a Cellular Network
20230011576 · 2023-01-12 ·

There is provided a performed by a first node for use in connecting a remote user equipment (UE) to a cellular network. An identity of the remote UE is acquired (102). A cryptographic function is applied (104) to the identity of the remote UE to generate a string identity for the remote UE. The string identity for the remote UE is stored (106) in a memory with the identity of the remote UE for use in connecting the remote UE to the cellular network via a relay UE connected to the cellular network.

Multi-link wireless communications connections

A method includes establishing a multi-link security association between a transmitter upper Media Access Control (MAC) logic entity of a transmitter and a receiver upper MAC logic entity of a receiver. The transmitter includes one or more transmitter links. The receiver includes one or more receiver links.

Multi-link wireless communications connections

A method includes establishing a multi-link security association between a transmitter upper Media Access Control (MAC) logic entity of a transmitter and a receiver upper MAC logic entity of a receiver. The transmitter includes one or more transmitter links. The receiver includes one or more receiver links.

Parameter exchange during emergency access using extensible authentication protocol messaging

Enabling the exchange of connection parameters where a user equipment (UE) lacks a secret shared with the network (e.g. a server), such as key materials, and lacks a valid certificate. In some embodiments, the connection parameters may be exchanged via EAP messages. In certain aspects, and particularly with respect to emergency attach, a simplified protocol is used with limited overhead because the UE does not attempt to authenticate the network, and the network does not attempt to authenticate the UE.

Parameter exchange during emergency access using extensible authentication protocol messaging

Enabling the exchange of connection parameters where a user equipment (UE) lacks a secret shared with the network (e.g. a server), such as key materials, and lacks a valid certificate. In some embodiments, the connection parameters may be exchanged via EAP messages. In certain aspects, and particularly with respect to emergency attach, a simplified protocol is used with limited overhead because the UE does not attempt to authenticate the network, and the network does not attempt to authenticate the UE.

Communication System and Comparison Method

A communication system and a comparison method for securing a communication path for a legitimate user via a terminal apparatus (“TA”). A vehicle-mounted communication device (“VMCD”) transmits a device ID identifying the VMCD to a TA, acquires a terminal ID from the TA, and transmits the device ID and the terminal ID acquired from the TA to a central apparatus. The TA transmits a terminal ID identifying the TA to the VMCD, acquires a device ID from the VMCD, and transmits the terminal ID and the device ID acquired from the VMCD to the central apparatus. The central apparatus receives a device ID and a terminal ID transmitted from the VMCD and a device ID and a terminal ID transmitted from the TA, and compares the device ID and the terminal ID received from the VMCD with the device ID and the terminal ID received from the TA.

SECURING IDENTITIES OF CHIPSETS OF MOBILE DEVICES
20180007559 · 2018-01-04 ·

A method of verifying IMEIs and chipset S/Ns of devices within a wireless communication network. The method comprises receiving a request from a device to access the wireless communication network and receiving an international mobile equipment identity (IMEI) and serial number (S/N) from the device, wherein the IMEI and S/N are included on a chipset of the device, and wherein the S/N is the S/N for the chipset. The method further comprises comparing the IMEI and S/N with a database to confirm the authenticity of the IMEI and S/N. Based upon the authenticity of the IMEI and S/N, the request is either granted or not granted for the device to access the wireless communication network.