H04W12/73

Detecting man-in-the-middle attacks in adaptive streaming
11552964 · 2023-01-10 · ·

Systems and methods for adaptively streaming video content to a wireless transmit/receive unit (WTRU) or wired transmit/receive unit may include obtaining a media presentation description that comprises a content authenticity, requesting a key for a hash-based message authentication code; receiving the key for the hash-based message authentication code, determining a determined hash for a segment of the media presentation description, requesting a reference hash for the segment from a server, receiving the reference hash for the segment from the server, and comparing the reference hash to the determined hash to determine whether the requested hash matches the determined hash.

Information transmission method, network device and terminal device

Provided are an information transmission method, a network device and a terminal device. The method comprises: a first network device obtains indication information, the indication information being used for indicating integrity protection (IP) check failure of data on a data radio bearer (DRB); the first network device sends the indication information to a second network device. In embodiments of the present application, by means of the indication information, the second network device can update a secret key of the terminal device during the IP check failure of data on the DRB, or the second network device can release RRC connection of the DRB. In this way, the potential safety hazard is eliminated, the communication security is ensured, and therefore, the success rate of data transmission is improved.

Information transmission method, network device and terminal device

Provided are an information transmission method, a network device and a terminal device. The method comprises: a first network device obtains indication information, the indication information being used for indicating integrity protection (IP) check failure of data on a data radio bearer (DRB); the first network device sends the indication information to a second network device. In embodiments of the present application, by means of the indication information, the second network device can update a secret key of the terminal device during the IP check failure of data on the DRB, or the second network device can release RRC connection of the DRB. In this way, the potential safety hazard is eliminated, the communication security is ensured, and therefore, the success rate of data transmission is improved.

Systems and methods for virtual personal Wi-Fi network

A wireless communication network includes a plurality of first electronic devices configured for wireless communication, at least one second electronic device configured for wireless communication, and at least one access point configured to wirelessly receive client data from, and transmit network data to, the plurality of first electronic devices and the at least one second electronic device. The wireless communication network further includes a virtual private wireless communication sub-network that includes the plurality of first electronic devices and excludes the at least one second electronic device. The virtual private wireless communication sub-network is configured to enable each of the plurality of first electronic devices to automatically connect with the wireless communication network.

Systems and methods for virtual personal Wi-Fi network

A wireless communication network includes a plurality of first electronic devices configured for wireless communication, at least one second electronic device configured for wireless communication, and at least one access point configured to wirelessly receive client data from, and transmit network data to, the plurality of first electronic devices and the at least one second electronic device. The wireless communication network further includes a virtual private wireless communication sub-network that includes the plurality of first electronic devices and excludes the at least one second electronic device. The virtual private wireless communication sub-network is configured to enable each of the plurality of first electronic devices to automatically connect with the wireless communication network.

Object control system to control navigation of a moving vehicle when exiting a road or a freeway
11538336 · 2022-12-27 · ·

This application discloses an object control system (OCS) to control navigation of a moving vehicle when exiting from its own road or freeway to a new road or freeway. The new road or freeway is an underpass or overpass and have no physical junction with the moving vehicle's own road or freeway. The moving vehicles obtains its navigation information data from the IoT network it is registered with and a plurality of stationary objects near and in vicinity of an exit. The stationary objects during the time slots assigned to them by OCS transmit variety of information data that assist moving vehicle navigating to the right lane and exit. These stationary objects also provide an operation information data that is used in the new road or freeway in case the vehicle exits to a road or freeway that belongs to a new cell with different operation information data.

METHODS AND APPARATUSES FOR FACILITATING CONNECTION TO A WIFI NETWORK
20220408258 · 2022-12-22 · ·

The embodiments herein relate to a network device, an access point and methods thereof for facilitating connection to a WiFi network. The method performed by the network device includes: detecting an access point provided with a service set identifier (SSID); connecting to said access point using said SSID; performing an authentication process towards an authentication and control server for verifying a unique certificate of the network device, which is paired with a corresponding certificate in said server; and in case the authentication process is successful, generating a unique identification information for enabling a user equipment to scan said unique identification information.

METHODS AND APPARATUSES FOR FACILITATING CONNECTION TO A WIFI NETWORK
20220408258 · 2022-12-22 · ·

The embodiments herein relate to a network device, an access point and methods thereof for facilitating connection to a WiFi network. The method performed by the network device includes: detecting an access point provided with a service set identifier (SSID); connecting to said access point using said SSID; performing an authentication process towards an authentication and control server for verifying a unique certificate of the network device, which is paired with a corresponding certificate in said server; and in case the authentication process is successful, generating a unique identification information for enabling a user equipment to scan said unique identification information.

SYSTEM FOR SEAMLESS RECOVERY OF DISTRIBUTED ACCESS POINTS IN A WIRELESS LOCAL AREA NETWORK

A computing system for recovery of lost access points in a distributed wireless local area network, including: (a) a host controller, (b) a plurality of access point, and (c) a plurality of stations. When setting up the network, the host controller is configured to register the plurality of access points, instruct the access points to send beacons to the plurality of stations, and perform a handshake to generate a unique encryption key for each of the plurality of stations. When the host controller detects that a physical access point has been lost and then recovered, it can optionally perform a handshake to generate a new encryption key and transmit this new encryption key to the other access points in the network before data communication commences to any of the stations through the recovered physical access point.

Detection of false base stations based on signal times of arrival

Apparatus, methods, and computer-readable media for facilitating detection of false base stations based on signal times of arrival are disclosed herein. An example method for wireless communication of a UE includes receiving a signal from each of one or more neighboring base stations. The example method also includes determining a system timing associated with the wireless communications network based on a respective time of arrival at which each signal is received from the neighboring base stations. The example method also includes receiving a signal from an FBS, the FBS signal being associated with a PCI different than the PCIs associated with the signals received from each of the neighboring base stations. Additionally, the example method includes identifying a presence of the FBS based on a difference between the system timing and a time of arrival at which the signal is received from the FBS.