Patent classifications
H04M1/68
Operation related to user equipment using secret identifier
A method performed by a network node of a serving public land mobile network, PLMN, associated with a user equipment, UE, comprising: obtaining a secret identifier that uniquely identifies the UE, wherein the secret identifier is a secret that is shared between the UE and at least a home PLMN of the UE and that is shared by the home PLMN with the network node; and performing an operation related to the UE using the secret identifier. Other methods, computer programs, computer program products, network nodes and a serving PLMN are also disclosed.
Compound transmission security (TRANSEC) for military-grade fifth generation (5G) radio systems
A multi-user (MU) multiple-input/multiple-output (MU MIMO) module for a fifth-generation (5G) software-defined radio (SDR) network environment is disclosed. In embodiments, the MU MIMO module of a transmitting SDR system of a 5G mobile ad hoc network (MANET) or other peer-to-peer directional network receives feedback from a receiving SDR system based on a prior or current frame and generates, based on the feedback, a compound transmission security (TRANSEC) encryption key for a subsequent frame. The compound TRANSEC encryption key encrypts the transmission of the subsequent frame through a combination of frequency-hopping encryption codes, orthogonality-hopping encryption codes, and dynamic pseudorandom distribution of transmitting power among antenna elements to simulate multipath hopping. The SDR system may include an antenna controller capable of managing dynamic power distribution according to the compound TRANSEC encryption keys as well as directionality shifts and beamforming operations to evade jammers detected within the 5G network environment.
Communication apparatus, method for controlling communication apparatus, and storage medium
There is provided a communication apparatus. A first communication unit receives an advertise signal from an external apparatus. A second communication unit wirelessly communicates with the external apparatus by using a predetermined protocol. A control unit determines whether the external apparatus supports the predetermined protocol on the basis of the advertise signal from the external apparatus. If it is determined that the external apparatus does not support the predetermined protocol, the control unit performs control so that a request to start encrypted communication is sent to the external apparatus via the first communication unit. If it is determined that the external apparatus supports the predetermined protocol, the control unit performs control so that a request to start unencrypted communication is sent to the external apparatus via the first communication unit.
Method and system for peer-to-peer enforcement
Methods and systems are provided for establishing dynamic and secure peer-to-peer communications channels between terminals. A network device may intercept a connection request transmitted from a first terminal to a second terminal, over a secure network, with the connection request including a first parameter that identifies the first terminal and a second parameter that identifies the second terminal, with the first parameter and the second parameter relating to a network interface that operates according to a security protocol. The network device may then send instructions to the first terminal to establish peer-to-peer communications with the second terminal over a secured ad-hoc public network, using one or more keys provided by a central unit of that network. The keys may include an authentication key, which may be used in authenticating one or both of the terminals, and/or an encryption key, which may be used in encrypting the peer-to-peer communications.
Method and system for peer-to-peer enforcement
Methods and systems are provided for establishing dynamic peer-to-peer communications channels between terminals. A connection request for establishing a communications channel between a first terminal and second terminal may be intercepted. The first terminal and the second terminal may be connectable over secured communications channels to a secured network. Based on the intercepted connection request and/or network parameters obtained from the first and the second terminals, the terminals may be instructed to establish a peer-to-peer communications channel over a network distinct from the secured network. Security of the peer-to-peer communications channel may be maintained, such as by use of authentication and/or encryption in one or both of the first terminal and the second terminal.
Authentication method and system
There is provided an authentication method and system where protection of user equipment (UE) privacy and network security can be improved. The system includes a third party communicatively trusted by and connected to the UE and one or more network entities, the third party configured to obtain identity information indicative of identity of the UE or the network entities and verify the UE and the network entities on whether the UE and the network entities are authorized to perform communications in the communication network. The third party is further configured to create mapping information, the mapping information including mappings between each identity indicated by the identity information and a respective temporary authentication identifier (ID) and according to the mapping information, transmit the respective temporary authentication ID to each of the UE and the network entities that are verified successfully by the third party. The system further includes the one or more network entities to which the UE is authenticated to access, each of the network entities configured to communicate with the UE or other network entities based on their respective temporary authentication ID.
Mobile terminal, and safety verification method and device for mobile payment
Provided are a mobile terminal, and a safety verification method and device for mobile payment. The mobile terminal includes a payment card and an NFC chip, also includes: a conduction switch coupled between the payment card and the NFC chip, and configured to receive a control signal from a processor and control, according to the control signal, closing or opening of a conduction path between the financial card and the NFC chip; and the processor, which is configured to verify, before the financial card transacts with an external reader, verification information input by a user; generate, when the verification information input by the user passes the verification, a control signal for controlling the conduction switch to open the conduction path, and generate, when the verification information input by the user does not pass the verification, a control signal for controlling the conduction switch to close the conduction path.
DETECTION OF PRIVACY BREACH DURING A COMMUNICATION SESSION
A method of identifying a breach in privacy during a communication session, including communicating with a remote communication device using a local communication device, analyzing an audio signal from the remote communication device to identify an audio input/output configuration of the remote communication device, determining from the audio input/output configuration if a breach in privacy is signified.
DETECTION OF PRIVACY BREACH DURING A COMMUNICATION SESSION
A method of identifying a breach in privacy during a communication session, including communicating with a remote communication device using a local communication device, analyzing an audio signal from the remote communication device to identify an audio input/output configuration of the remote communication device, determining from the audio input/output configuration if a breach in privacy is signified.
Mobile terminal device, information management device, and information management system
According to the present invention, a mobile terminal device includes: an operation input section which accepts operations; a memory section which previously stores a list of states of the mobile terminal device during use as locking conditions to determine a state at the time of limiting an operation of the mobile terminal device; a state determining section which generates state information in accordance with a state of the mobile terminal device; and a function limiting section which determines whether the state information meets the locking conditions, and switches the mobile terminal device to a locked state to limit an operation of the operation input section, when the state information is determined to meet the locking conditions.