Patent classifications
H04W12/75
SECURE COMMUNICATION METHOD AND APPARATUS
A secure communication method and apparatus are disclosed, to ensure security of a direct communication between terminal devices. In this application, a first terminal device may receive a key generation parameter from a first network element, where the key generation parameter includes a ProSe temporary identity of the first terminal device. Then, the first terminal device may generate a first discovery key based on the key generation parameter. The first terminal device sends a ProSe request message, where the ProSe request message includes the ProSe temporary identity and a message integrity code, and the message integrity code is generated based on the discovery key. The second terminal device receives the ProSe request message, and verifies the first terminal device based on the message integrity code, to ensure the security of a direct communication between the first terminal device and the second terminal device.
SECURE COMMUNICATION METHOD AND APPARATUS
A secure communication method and apparatus are disclosed, to ensure security of a direct communication between terminal devices. In this application, a first terminal device may receive a key generation parameter from a first network element, where the key generation parameter includes a ProSe temporary identity of the first terminal device. Then, the first terminal device may generate a first discovery key based on the key generation parameter. The first terminal device sends a ProSe request message, where the ProSe request message includes the ProSe temporary identity and a message integrity code, and the message integrity code is generated based on the discovery key. The second terminal device receives the ProSe request message, and verifies the first terminal device based on the message integrity code, to ensure the security of a direct communication between the first terminal device and the second terminal device.
METHOD FOR AUTOMATIC RECOGNITION BETWEEN A MOBILE DEVICE AND A MOTOR VEHICLE, CAPABLE OF FUNCTIONING ACCORDING TO THE BLE PROTOCOL
The invention relates to a method for automatic recognition between a mobile electronic device (SP) and a motor vehicle (Vi) equipped with an electronic communication module (120), said mobile electronic device (SP) and the electronic module (120) of the vehicle (Vi) being capable of operating according to the BLE protocol, the mobile electronic device (SP) being in a “scanning”mode and the electronic communication module (120) of the vehicle (Vi) being in an “advertising” mode characterised in that it comprises various steps consisting of:—in the electronic module (120) of the vehicle (Vi), obtaining identification data (RPAi) of the vehicle (Vi);—transmitting at least one data frame (Td) comprising the identification data (RPAi) of the vehicle (Vi), from the electronic module (120) of the vehicle (Vi) to the mobile electronic device (SP);—receiving the at least one data frame (Td) containing the identification data (RPAi) of the vehicle (Vi), in the mobile electronic device (SP) set in “scanning” mode;—checking, in the mobile electronic device (SP), that the transmitted identification data (RPAi) is valid, then transmitting a connection request (110) from the mobile electronic device (SP) to the electronic module (120) of the vehicle (Vi).
Systems and methods for enabling additional devices to check in to Bluetooth low energy (BLE) beacons
Systems and methods are provided for checking many users in to a location using a Bluetooth® low energy (BLE) beacon. The provided systems and methods may allow a BLE beacon to facilitate a check in with a remote server that processes check ins and then disconnect from the device used to check in. The device may be assigned a unique identifier that may be broadcast from the device during the check in so that the BLE beacon can quickly scan for the identifier and connect with the device based on the identifier to provide content and other information to the device.
Handling of unique identifiers for stations
Methods, systems, and computer readable media can be operable to facilitate an exchange of messages between an access point and a station, wherein the access point requests a unique identifier from the station. The station may either respond with a message declining to provide a unique identifier or respond with a message including a unique identifier to be used by the access point for the station. The response from the station may include additional limitations on the use of the unique identifier by the access point. The access point may enforce different policies against a station depending upon how the station responds to the unique identifier request.
Privacy-enhanced method for linking an eSIM profile
A temporary EID (TEID) is generated based on an indicator of a hash algorithm, a nonce, and a hash generated using the hash algorithm. The hash is generated based on the indicator, nonce, and EID of a mobile device. The TEID is sent to the mobile network operator to identify the mobile device in lieu of using the device's EID. The TEID is stored in a data store and an eSIM profile for the mobile device is associated the TEID. The mobile device sends to an eSIM server the device's EID over a secure communications channel. The eSIM server generates a hash using the indicator and nonce contained in the stored TEID and the EID of the mobile device. The eSIM server verifies that the generated hash matches the hash contained in the TEID stored in the data store. If the hash matches, the eSIM server sends, to the mobile device, subscription credentials for accessing the mobile network in accordance with the data plan.
SYSTEM FOR DETECTION AND IDENTIFICATION OF ELECTRONIC DEVICES AND ALLOCATION OF PROXY IDENTIFIERS FOR SAME
Embodiments are directed to detection and identification of electronic devices and allocation of proxy identifiers for the same. Embodiments detect one or more electronic devices within a wireless network range; identify the one or more electronic devices within the wireless network range, comprising matching the one or more electronic devices with one or more entries in a database of users; determine that the one or more electronic devices has stored thereon one or more credentials; access the one or more credentials; allocate proxy identifiers corresponding to the one or more credentials; and initiate storage of the allocated proxy identifiers on the one or more electronic devices.
DHCP SERVER IP ADDRESS ALLOCATION IMPROVEMENT TO NULLIFY THE IMPACT OF MAC RANDOMIZATION
A Dynamic Host Configuration Protocol (DHCP) server includes a memory storing computer-readable instructions, and a processor configured to execute the computer-readable instructions to determine a media access control (MAC) address associated with a client, determine the MAC address associated with the client is a randomized MAC address, and assign an IP address the client from a DHCP IP server pool. The processor assigns an IP address to the client from a DHCP IP server pool using one of identifying, in a DHCP server table, at least one host name of the client and assigning a previously assigned IP address to the at least one host name of the client, and when the host name of the client is not available, assigning the IP address using a first lease with a first duration shorter than a default lease duration used for non-randomized MAC addresses.
SYSTEM AND METHOD FOR REMOTE AUTHENTICATION WITH DYNAMIC USERNAMES
A method and apparatus for authenticating a user for access to a service provider over a network is disclosed. It includes a first device configured to receive a request for a ticket, generate the ticket, send the ticket to at least one additional device, generate a first partial signature of the ticket, receive additional partial signatures of the ticket, generate a complete signature of the ticket, encrypt the ticket and the complete signature of the ticket, send the encrypted ticket and encrypted complete signature of the ticket to the service provider, receive an encrypted verification code from the service provider, decrypt the encrypted verification code, and display the decrypted verification code.
Connecting to Virtualized Mobile Core Networks
A 5G Network Architecture uses virtualization and network slicing. The user equipment (UE) interacts with an underlay network that interacts with virtual network slices. The UE interacts with the underlay network (ULN) to establish a connection to a virtual network slice. Procedures are defined to assign a new slice instance to a UE (UE initiated and ULN initiated); to change a UE Profile (UE initiated and ULN Initiated); and to change a UE's assigned slice instance (ULN Initiated).