H04L2209/80

WIRELESS BATTERY MANAGEMENT SYSTEM SETUP

Aspects of this description provide for a computer program product comprising computer executable instructions. In at least some examples, the instructions are executable by a controller to cause the controller to broadcast, in a data frame, a scan request to a node, the scan request including a certificate of the controller and a public authentication key of the controller, receive, in the data frame, a scan response from the node, the scan response including a certificate of the node and a public authentication key of the node, and perform pairing between the controller and the node based on the public authentication key of the node and a private authentication key of the controller.

PERSONAL EMULATING DEVICE FOR EMULATING GLOBAL PHONE COMMUNICATION AS DOMESTIC MOBILE COMMUNICATION
20230048238 · 2023-02-16 ·

A personal emulating device for emulating global phone communication as domestic mobile communication comprises a Universal Subscriber Identity Module (USIM) authentication unit, an information confirmation unit, an authentication processing unit, and a linking unit. The USIM authentication unit includes: a USIM interface unit which interfaces with a USIM of a designated standard; an antenna unit which transmits and receives radio frequency signals of a designated mobile communication standard to and from a base station in a mobile communication network corresponding to the USIM interfaced to the USIM interface unit; and a radio unit which performs a signal processing operation for transmitting and receiving the radio frequency signals of the designated mobile communication standard to and from the base station in the mobile communication network corresponding to the USIM interfaced to the USIM interface unit.

PAIRING METHOD APPLIED TO SHORT-RANGE COMMUNICATION SYSTEM AND WIRELESS DEVICE
20230052917 · 2023-02-16 ·

Embodiments of this application disclose a pairing method applied to a short-range communication system and a wireless device in the field of wireless communication. The method includes: obtaining, by a first wireless device, a first password, where the first password is shared by the first wireless device and a second wireless device; and pairing, by the first wireless device, with the second wireless device based on a password-based authenticated key exchange (PAKE) protocol and by using the first password as an encryption password in a key exchange process.

METHODS AND SYSTEMS FOR REDUCING PROPAGATION DELAYS IN HARDWARE IMPLEMENTATION OF ZUC CRYPTOGRAPHIC ALGORITHMS

Embodiments of present disclosure relates to and systems to reduce propagation delays in hardware implementation of 3GPP confidentiality or standardized algorithm 128-EEA3 and 3GPP integrity algorithm 128-EIA3 using ZUC module. The reduction of the propagation delays is achieved by improving or optimizing secondary critical paths, which are subsequent to primary critical path, related to the 3GPP confidentiality or standardized algorithm 128-EEA3 and the 3GPP integrity algorithm 128-EIA3. Non-conventional modifications in the hardware implementation are proposed for the improvement or optimization.

Electronic device for receiving data packet in Bluetooth network environment and method thereof

An electronic device for receiving data packets in a Bluetooth environment is provided. The electronic device includes a wireless communication circuitry configured to support a Bluetooth protocol. The wireless communication circuitry is configured to establish a first link with a first external electronic device, synchronize a secret key generation scheme with the first external electronic device based on information obtained while establishing the first link, receive page information transmitted from a second external electronic device, based on Bluetooth address information of the first external electronic device, the Bluetooth address information being obtained while establishing the first link, generate a link key used for a second link between the first external electronic device and the second external electronic device, based on the synchronized secret key generation scheme, and receive an encrypted data packet transmitted over the second link from the second external electronic device using the generated link key.

Modifying security state with secured range detection

Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.

Vehicle control device and program

A vehicle control device is provided. The vehicle control device includes a terminal device authentication unit that determines whether a terminal device of a user registered as a user of a vehicle, in advance, is present around or within the vehicle. The vehicle control device also includes a communication unit that communicates with the terminal device. Also included in the vehicle control device is a control unit that causes a display device provided in the vehicle to output a screen for setting communication between the communication unit and the terminal device. The display device outputs the screen in a case where it is determined by the terminal device authentication unit that the terminal device is present and the display device is started up.

Global resource locator label
11579239 · 2023-02-14 · ·

A global resource locator (GRL) device can be used to track a physical asset. The GRL device can a semiconductor chip with a processor and a timing device. The semiconductor chip can generate a timing signal. The GRL device can include a blockchain, a communication device, and a memory in logical communication with the processor. The memory can store an identifier, a public key, a private key, and a hash. The communication device can communicate wirelessly with an authenticated radio source, the micro sized timing device, and the blockchain. Each authenticated radio source can be located at a respective reference location. The communication device can receive wireless timing signals from at least three authenticated radio sources. The GRL device can be affixed to a product.

Secret key generation for wireless channels

A method of operating a first node to generate a secret key for encrypting wireless transmissions between the first node and a second node. The method comprises receiving a first training signal comprising a plurality of subcarriers from the second node and constructing a matrix from the frequency responses of each of the plurality of subcarriers of the first training signal at the first node. A singular value decomposition of the matrix is computed; and a secret key is derived from one or more singular vectors of the singular value decomposition.

Device independent encrypted content access system

Systems, devices, media, and methods are presented for retrieving authentication credentials and decryption keys to access remotely stored user-generated content. The systems and methods receive a first authentication credential and access a second authentication credential based on receiving the first authentication credential. The system and methods generate an authentication token and an encryption token. Based on the authentication token, the system and methods access a set of encrypted content and an encrypted content key. The systems and methods decrypt the encrypted content key using the encryption token and decrypt the set of encrypted content using the decrypted content key. At least a portion of the content is presented at the user device.