H04W12/73

NETWORK CONNECTION SYSTEM AND NETWORK CONNECTION METHOD THEREOF

The present invention relates to a network connection system. The network connection system includes a gateway, an extender, and a wireless access point. Wherein, the gateway can be used as one of the enrollee router and the registrar router, and the extender can be used as the other of the enrollee router and the registrar router, and the extender can send authentication information to the gateway. After the gateway confirms that the extender is a model supported by the gateway according to the authentication information, the gateway sends a credential to the extender, allowing the extender to establish a wireless mesh network through the wireless access point. In this way, the purpose of seamless connection is achieved. In addition, the network connection system of the present invention has functions such as high security and convenience.

Methods and apparatuses for dynamically updating routing identifier(s)

Systems, methods, apparatuses, and computer program products for dynamically updating routing identifiers (IDs) are provided. One method may include deciding, at a network node, to update a routing identifier for at least one user equipment. The method may then include obtaining or generating a new routing identifier to be assigned to the at least one user equipment along with authentication vectors, and transmitting the new routing identifier to an authentication entity.

Methods and apparatuses for dynamically updating routing identifier(s)

Systems, methods, apparatuses, and computer program products for dynamically updating routing identifiers (IDs) are provided. One method may include deciding, at a network node, to update a routing identifier for at least one user equipment. The method may then include obtaining or generating a new routing identifier to be assigned to the at least one user equipment along with authentication vectors, and transmitting the new routing identifier to an authentication entity.

SYSTEM FOR IDENTIFICATION OF SECURE WIRELESS NETWORK ACCESS POINTS USING CRYPTOGRAPHIC PRE-SHARED KEYS
20230023649 · 2023-01-26 · ·

A system is provided for identification of secure wireless network access points using cryptographic pre-shared keys. In particular, the system may comprise a client-side application that may use a pre-shared key to generate a list of valid access point ID's in a pseudorandom manner. A server-side application may use the same pre-shared key to generate one or more access point ID's. Based on the pre-shared key, a client computing device may readily identify which wireless access points within the network are secure and trusted.

METHODS AND SYSTEMS FOR PUSHING DATA TO CLIENT DEVICES OVER A TELECOMMUNICATIONS DATA NETWORK
20230232224 · 2023-07-20 ·

Methods and/or systems for pushing data to identity components installed in the client devices. The systems include a credential management server, a network modem, and/or an identity component. The methods include establishing communications between a credential management server and an identity component.

METHODS AND SYSTEMS FOR PUSHING DATA TO CLIENT DEVICES OVER A TELECOMMUNICATIONS DATA NETWORK
20230232224 · 2023-07-20 ·

Methods and/or systems for pushing data to identity components installed in the client devices. The systems include a credential management server, a network modem, and/or an identity component. The methods include establishing communications between a credential management server and an identity component.

Connection method for smart home device and apparatus thereof

A method and apparatus are provided for connecting a user equipment to electronic devices. The method includes receiving, for a connection to an electronic device, a first broadcast message transmitted by the electronic device according to a first communication mode, wherein the first broadcast message includes information indicating whether the electronic device supports a connection to the electronic device according to at least one of the first communication mode or a second communication mode that is different from the first communication mode; determining whether the electronic device supports the connection to the electronic device according to at least one of the first communication mode or the second communication mode based on the information; and establishing the connection to the electronic device according to the first communication mode or the second communication mode based on a result of the determining.

SERVICE AUTHORIZATION METHOD, APPARATUS, AND SYSTEM
20230019000 · 2023-01-19 ·

Embodiments of this application relate to a service authorization method and system, and an apparatus. The method includes: A first NRF receives a first request requesting an access token for accessing service of a second NF in a second network from a first NF, where the first NF and the first NRF are located in a first network, and the first request includes SNPN information of the first network and/or the second network. The first NRF forwards the first request to a second NRF located in the second network. The second NRF generates an access token in response to the first request, where the access token includes the SNPN information of the first network and/or the second network. The second NRF sends the access token to the first NRF. The first NRF receives the access token and sends the access token to the first NF.

NETWORK ACCESS AND MANAGEMENT VIA WIRELESS ACCESS PROFILES

Communication management hardware controls network access via generation and distribution of wireless access profiles. For example, the communication management hardware receives a network access request from first user equipment to use a network over an open SSID network. In response to detecting that the first user equipment operated by a non-subscriber is not yet authorized to use the network, such as because the first user equipment has not signed up for use of the network, the communication management hardware directs the first user equipment to a portal. The communication management hardware then communicates a wireless access profile to the first user equipment. In one arrangement, the wireless access profile is derived based on input from the first user equipment. The wireless access profile provides the first user equipment wireless access to the network via a secure SSID.

Geographic location consensus determination

Techniques are disclosed relating to determining whether geographic locations of a user computing device satisfy a location consensus threshold. A computer system receives results of a plurality of location determination operations, each of which specifies a geographic location of a computing device initiating an action. The computer system then makes a determination whether the received results satisfy a consensus threshold as to geographic location of the computing device. In some embodiments, the determination is usable to select, from a plurality of sets of rules for different geographic regions, a particular set of rules for processing the action. In some cases, the particular set of rules is usable to determine whether to process the action. Such techniques may advantageously allow a processing system to understand how to process actions initiated by a computing device associated with different geographic locations.