Patent classifications
H04W12/75
Roll-over of identifiers and keys for unicast vehicle to vehicle communication links
Methods, systems, and devices for wireless communications are described that improve privacy in wireless communications, such as communications by a user equipment (UE), which may in some cases be a vehicle UE. For example, various vehicle-to-everything (V2X) transmissions may be unencrypted, and a vehicle may be expected to periodically change one or more identifiers it uses for various communication services. Privacy may be enhanced, for example, via encryption key roll-over, as well as roll-over of one or more other identifiers associated with a UE that may potentially be used by an observer to track the UE. The UE may transmit a message that includes an updated lower layer identifier (e.g., a layer-2 (L2) identifier) to another UE in a V2X unicast communications link, which may trigger a change in identifiers of a set of identifiers and an updated security context. All or a portion of the message may be encrypted.
Access and mobility function (AMF) data storage in cellular network registration
A system and method may improve latency for user equipment (UE) registration in cellular networks. UE registration may retrieve the UE's configuration and subscription data locally rather than from a network or cloud-based unified data management (UDM) entity that manages a unified data repository (UDR). For example, the UE may send a unique identification (e.g., a UE ID) for the UE to a registering entity of a cellular network system. The UE ID may then be used to identify a UE Group Identification for the UE at the UDM. The UE Group Identification may be a pointer to the locally-stored configuration and subscription data for the UE. The entity requesting registration may then use the pointer to retrieve the configuration and subscription data locally rather than a remote entity such as the UDM.
Access and mobility function (AMF) data storage in cellular network registration
A system and method may improve latency for user equipment (UE) registration in cellular networks. UE registration may retrieve the UE's configuration and subscription data locally rather than from a network or cloud-based unified data management (UDM) entity that manages a unified data repository (UDR). For example, the UE may send a unique identification (e.g., a UE ID) for the UE to a registering entity of a cellular network system. The UE ID may then be used to identify a UE Group Identification for the UE at the UDM. The UE Group Identification may be a pointer to the locally-stored configuration and subscription data for the UE. The entity requesting registration may then use the pointer to retrieve the configuration and subscription data locally rather than a remote entity such as the UDM.
Anonymous Identity In Identity Oriented Networks and Protocols
A method of using ephemeral identifiers (IDs) in a network implemented a network element (NE) comprises obtaining ephemeral ID for at least one user equipment (UE) accessible by the NE, wherein the ephemeral ID is a temporary and recyclable ID associated with the UE, transmitting a request to map the ephemeral ID of the UE to a locator of the NE to a mapping server, and establishing a communication session between the UE and a network site using the ephemeral ID.
Method and network node for obtaining a permanent identity of an authenticating wireless device
A network node, such as a Wi-Fi Access Point/Authenticator, is able to obtain a permanent device identity of a wireless device requesting authentication, in case the wireless device has only provided an alias. This is achieved by the network node intercepting an authentication message from the wireless device, wherein the authentication message includes a signaled identity of the wireless device, and extracts the signaled identity. In case the extracted identity is an alias and not a permanent identity of the wireless device, the network node responsively manipulates at least one further authentication message to cause the wireless device to signal its permanent identity in a subsequent authentication message.
Wireless device detection systems and methods incorporating streaming survival modeling for discrete rotating identifier data
A wireless device detection system can include processors, memory devices, and sensors to receive temporary identifiers transmitted between a base station and a mobile wireless device. The memory devices include instructions that cause the processors to build a cumulative distribution function for survival probability based on delta times between multiple access events for each of multiple temporary identifiers received from the sensors. In response to a new access event, the processors add a corresponding temporary identifier to a streaming list and assign a survival probability value, based on the cumulative distribution function, to a latest access event for each temporary identifier contained in the streaming list. The processors remove temporary identifiers from the streaming list that have a survival probability value less than a threshold value, compare the number of temporary identifiers contained in the streaming list to a number of devices known to be present, and calculate the probability that a device corresponding to each of the temporary identifiers contained in the streaming list is present.
Wireless device detection systems and methods incorporating streaming survival modeling for discrete rotating identifier data
A wireless device detection system can include processors, memory devices, and sensors to receive temporary identifiers transmitted between a base station and a mobile wireless device. The memory devices include instructions that cause the processors to build a cumulative distribution function for survival probability based on delta times between multiple access events for each of multiple temporary identifiers received from the sensors. In response to a new access event, the processors add a corresponding temporary identifier to a streaming list and assign a survival probability value, based on the cumulative distribution function, to a latest access event for each temporary identifier contained in the streaming list. The processors remove temporary identifiers from the streaming list that have a survival probability value less than a threshold value, compare the number of temporary identifiers contained in the streaming list to a number of devices known to be present, and calculate the probability that a device corresponding to each of the temporary identifiers contained in the streaming list is present.
Apparatus and method for accessing wireless network
A method of using subscriber identification information stored in mobile user equipment (UE) to connect to a communication service over a public wireless network in the UE, establishing a communication link between the UE and a device, generating network access information (NAI) associated with the communication service in the UE, and sending the NAI from the UE to the device via the communication link. The method further comprises connecting the communication service in the device using the NAI and terminating the connection of the communication service in the UE.
Bluetooth transmission security pattern
Beacon devices transmit beacon messages that may be used to alert an application on a user device, e.g., a mobile phone, of the beacon device's proximity. Some embodiments contemplate a beacon device configured to transmit a pattern of successive beacon messages and/or Bluetooth Low Energy broadcast messages at one or more different power levels. The pattern of power levels may securely identify the beacon device. For example, the mobile phone application may confirm with a network server that the pattern agrees with the beacon device's identity. The pattern may also serve a calibration function. Where the mobile device application has knowledge of the expected power levels in the pattern, the application can infer from weaker transmissions that the beacon device is further from the mobile device. The weaker power levels may also indicate the character of the transmission environment.
Platform identity architecture with a temporary pseudonymous identity
In an example, a client-server platform identity architecture is disclosed. The platform identity architecture may be used to enable a venue operator to provide online services and to collect telemetry data and metrics while giving end users greater control over privacy. When entering a compatible venue, the user's device generates a signed temporary pseudonymous identity (TPI) in secure hardware or software. Any telemetry uploaded to the venue server includes the signature so that the server can verify that the data are valid. The TPI may have a built-in expiry. The venue server may thus receive useful tracking data during the term of the TPI, while the user is assured that the data are not kept permanently or correlated to personally-identifying information.