H04W12/75

Methods and Apparatus for Provisioning Private Network Devices During Onboarding

A method for operating a user equipment (UE) includes transmitting, by the UE, a registration request message to establish a connection for onboarding, the registration message comprising an onboarding and provisioning indication information; and completing, by the UE with a network entity, provisioning in accordance with the onboarding and provisioning indication information.

ENABLERS FOR RADIO ACCESS NETWORK CONTEXT STORAGE AND RESILIENCY
20230032390 · 2023-02-02 · ·

Techniques for improving the resiliency of communication networks by providing radio access network data stored in a radio access network database to one or more associated radio access network nodes are provided. A network entity receives a connection request from a user device including at least a radio access network set identifier or radio access network database identifier. The network entity determines whether the radio access network set identifier received in the connection request corresponds to an associated radio access network set identifier. In an instance in which the radio access network set identifier received in the connection request corresponds to the associated radio access network set identifier, radio access network database data are retrieved from the radio access network database associated with the radio access network set identifier. The radio access network database data include at least user device context data for the associated user device.

Communication Method and Communication Apparatus
20220353340 · 2022-11-03 ·

In a communication method when a preset quantity of terminal devices is allowed to simultaneously use a user identifier and a terminal device expects to use the user identifier, the terminal device sends a first message including the user identifier to a first network element. The first network element determines, based on information about the user identifier, whether the first terminal device is allowed to use the user identifier.

ADDRESS RANDOMIZATION SCHEMES FOR MULTI-LINK DEVICES

Embodiments are disclosed for address changing schemes for a multi-link device in a wireless communications system. Some embodiments include a privacy enhanced (PE) access point (AP) multi-link device (MLD) that includes one or more affiliated APs operating on different links. The PE AP MLD can generate a first randomized OTA MLD address based at least on the MLD address of the PE AP MLD for a first affiliated PE AP (PE AP1). The PE AP MLD can transmit a first data transmission using the first OTA MLD address where the first data transmission includes an encrypted aggregated MAC service data unit (A-MSDU) subframe that includes the MLD address. The PE AP MLD can correlate the MLD address of the PE AP MPL with multiple addresses comprising: the first OTA MLD, a unique MLD address, and a Media Access Control (MAC) service access point (SAP) MLD address.

ELECTRONIC DEVICE FOR TRANSMITTING AND/OR RECEIVING IDENTITY INFORMATION AND OPERATING METHOD THEREOF
20230091254 · 2023-03-23 ·

According to an embodiment, an electronic device may include a communication circuit and at least one processor operatively connected to the communication circuit, and the at least one processor may be configured to connect, via the communication circuit, a communication with a first external electronic device, receive, from the first external electronic device via the communication circuit, a first packet requesting generation of a temporary identity resolving key (IRK) of the electronic device by a second external electronic device, generate a temporary IRK, set a validity period for the temporary IRK, and transmit, to the first external electronic device via the communication circuit, a second packet including the temporary IRK and the validity period for the temporary IRK.

SYSTEM AND METHOD ASSOCIATED WITH CALIBRATED INFORMATION SHARING USING WAVE DYNAMIC COMMUNICATION PROTOCOL IN AN EPHEMERAL CONTENT-BASED PLATFORM
20220345533 · 2022-10-27 ·

An ephemeral content distribution system associated with exchanging calibrated communications using a wave dynamic communication protocol based at least on a current wave-state of a user is disclosed. The system transmits a wave-based request for wave dynamic communications associated with a first user. The system processes wave-geographic information associated with a bounded geographical region based on a wave-state of a second user that received the wave-based request. The system processes wave-identity information associated with the wave-state of the second user. The system next receives a response of the second user to the wave-based request in accordance with the wave-state of the second user. The system further facilitates an exchange of the calibrated communications between the first and the second user based on the wave-identity of the second user using the wave dynamic communication protocol associated with discrete epochs of the calibrated communications in the ephemeral content distribution system.

Corresponding methods and a computer-readable device are also disclosed.

Methods and apparatus to collect distributed user information for media impressions and search terms

Disclosed examples include accessing impression data collected at a media device by a collector installed with an application, the impression data including a first identifier, a second identifier, and a media identifier, the first identifier to identify at least one of the media device or a user of the media device to a first database proprietor, and the second identifier to identify the at least one of the media device or the user of the media device to a second database proprietor, the collector to obtain the first and second identifiers from a memory of the media device; requesting first demographic information from the first database proprietor based on the first identifier and second demographic information from the second database proprietor based on the second identifier; and storing at least some of the first or second demographic information in association with the media identifier in a data store.

UTILIZING AID TO SET A STATION MAC ADDRESS IN A WLAN SYSTEM
20230084715 · 2023-03-16 ·

To protect and ensure security and/or privacy, an access point and a wireless network device can exchange capabilities information. The capabilities information can indicate that each of the access point and the wireless network device support generation of an association identifier association media access control (A-AMAC) identifier. The A-AMAC identifier is based on an association identifier (AID) (that is assigned by the access point and associated with the wireless network device) and any other information exchanged between the access point and the wireless network device. The A-AMAC identifier once generated can be stored by the access point. The A-AMAC identifier is then used for post association communications between the access point and the wireless network device. As the A-AMAC identifier is a unique identifier for the association of the access point and the wireless network device, tracking of the wireless network device is thwarted or inhibited.

DISTINGUISHING BETWEEN AGGRESSIVE AND NON-AGGRESSIVE DEVICES
20230080679 · 2023-03-16 ·

Aggressive behavior by aggressive devices against a radio access network (RAN) can be detected and mitigated, while allowing benign devices to attach to a network. A security management component (SMC) can analyze temporary device identifier data (TDID) associated with RAN and an attach request and associated information, comprising a temporary device identifier (TDI), received from a device. Based on the analysis, SMC can reject the attach request if TDI is not in TDID and store TDI in TDID, or can accept the attach request if TDI is in TDID and a threshold amount of time since a previous attach request associated with TDI is determined to be satisfied. SMC can continue to monitor attach requests, and if the device detaches from the network and sends another attach request associated with TDI to quickly reattach to network, SMC can reject the attach request and identify the device as aggressive.

DISTINGUISHING BETWEEN AGGRESSIVE AND NON-AGGRESSIVE DEVICES
20230080679 · 2023-03-16 ·

Aggressive behavior by aggressive devices against a radio access network (RAN) can be detected and mitigated, while allowing benign devices to attach to a network. A security management component (SMC) can analyze temporary device identifier data (TDID) associated with RAN and an attach request and associated information, comprising a temporary device identifier (TDI), received from a device. Based on the analysis, SMC can reject the attach request if TDI is not in TDID and store TDI in TDID, or can accept the attach request if TDI is in TDID and a threshold amount of time since a previous attach request associated with TDI is determined to be satisfied. SMC can continue to monitor attach requests, and if the device detaches from the network and sends another attach request associated with TDI to quickly reattach to network, SMC can reject the attach request and identify the device as aggressive.