H04W12/03

BASE STATION, ACCESS MOBILITY MANAGEMENT ENTITY, EVOLVED SERVING MOBILE LOCATION CENTER AND USER EQUIPMENT
20230049980 · 2023-02-16 · ·

A base station for a mobile telecommunications system, comprising circuitry configured to: obtain time-sensitive network information or enhanced positioning assistance information; encrypt the time-sensitive network information or the enhanced positioning assistance information for including the encrypted time-sensitive network information or the encrypted enhanced positioning assistance information in system information; and transmit the system information to a user equipment in a cell, wherein the encryption is performed if the cell hosts and shares functionalities of a non-public cell and a public cell.

BASE STATION, ACCESS MOBILITY MANAGEMENT ENTITY, EVOLVED SERVING MOBILE LOCATION CENTER AND USER EQUIPMENT
20230049980 · 2023-02-16 · ·

A base station for a mobile telecommunications system, comprising circuitry configured to: obtain time-sensitive network information or enhanced positioning assistance information; encrypt the time-sensitive network information or the enhanced positioning assistance information for including the encrypted time-sensitive network information or the encrypted enhanced positioning assistance information in system information; and transmit the system information to a user equipment in a cell, wherein the encryption is performed if the cell hosts and shares functionalities of a non-public cell and a public cell.

PAIRING METHOD APPLIED TO SHORT-RANGE COMMUNICATION SYSTEM AND WIRELESS DEVICE
20230052917 · 2023-02-16 ·

Embodiments of this application disclose a pairing method applied to a short-range communication system and a wireless device in the field of wireless communication. The method includes: obtaining, by a first wireless device, a first password, where the first password is shared by the first wireless device and a second wireless device; and pairing, by the first wireless device, with the second wireless device based on a password-based authenticated key exchange (PAKE) protocol and by using the first password as an encryption password in a key exchange process.

PAIRING METHOD APPLIED TO SHORT-RANGE COMMUNICATION SYSTEM AND WIRELESS DEVICE
20230052917 · 2023-02-16 ·

Embodiments of this application disclose a pairing method applied to a short-range communication system and a wireless device in the field of wireless communication. The method includes: obtaining, by a first wireless device, a first password, where the first password is shared by the first wireless device and a second wireless device; and pairing, by the first wireless device, with the second wireless device based on a password-based authenticated key exchange (PAKE) protocol and by using the first password as an encryption password in a key exchange process.

METHOD FOR AUTHENTICATING A USER TERMINAL
20230049377 · 2023-02-16 ·

A method for authenticating a user terminal as a transmitter of a message transmitted in a wireless communication network having a plurality of spatially distributed user terminals, The message is transmitted from a first user terminal to at least one second and/or one third user terminal with the aid of a wireless communications connection. The message includes useful data, first user-terminal-specific and second user-terminal-specific authentication data. The first user terminal is authenticated as the transmitter of the message based on the first user-terminal-specific authentication data with the aid of the second user terminal, and/or based on the second user-terminal-specific authentication data with the aid of the third user terminal.

SECURITY NEGOTIATIONS BETWEEN DIFFERENT VERSIONED PROTOCOL DEVICES TO ENABLE BACKWARD COMPATIBILITY
20230051133 · 2023-02-16 ·

A system and method of performing communications over a communications network that uses a communication protocol having multiple different versions, provides for backwards compatibility when devices that support a higher or more secure version of the communication protocol are added to a network having devices that only support a lower or less secure version of the communication protocol. The system and method includes a technique of negotiating and establishing security procedures to be implemented in a communication connection between two devices on the network based on initial session request messages that indicate the version of the communication protocol supported by one or both of the devices. This system and method enable higher and lower protocol version devices (i.e., devices that conform to or that use the same communication protocol but that have different versions of the protocol installed therein) to communicate with one another in the most secure manner, thereby making higher version devices added to a network backward compatible with lower version devices already within the network.

Electronic device for receiving data packet in Bluetooth network environment and method thereof

An electronic device for receiving data packets in a Bluetooth environment is provided. The electronic device includes a wireless communication circuitry configured to support a Bluetooth protocol. The wireless communication circuitry is configured to establish a first link with a first external electronic device, synchronize a secret key generation scheme with the first external electronic device based on information obtained while establishing the first link, receive page information transmitted from a second external electronic device, based on Bluetooth address information of the first external electronic device, the Bluetooth address information being obtained while establishing the first link, generate a link key used for a second link between the first external electronic device and the second external electronic device, based on the synchronized secret key generation scheme, and receive an encrypted data packet transmitted over the second link from the second external electronic device using the generated link key.

Electronic device for receiving data packet in Bluetooth network environment and method thereof

An electronic device for receiving data packets in a Bluetooth environment is provided. The electronic device includes a wireless communication circuitry configured to support a Bluetooth protocol. The wireless communication circuitry is configured to establish a first link with a first external electronic device, synchronize a secret key generation scheme with the first external electronic device based on information obtained while establishing the first link, receive page information transmitted from a second external electronic device, based on Bluetooth address information of the first external electronic device, the Bluetooth address information being obtained while establishing the first link, generate a link key used for a second link between the first external electronic device and the second external electronic device, based on the synchronized secret key generation scheme, and receive an encrypted data packet transmitted over the second link from the second external electronic device using the generated link key.

Power coupling modulation transmission
11582612 · 2023-02-14 · ·

Embodiments of communication systems are disclosed for protecting communication between an implanted device ID and an external device ED. For example, a one way Transcutaneous energy transfer TET link may be used to secure two way communication over a radio channel. Optionally, the TET link may be protected from intrusion by a malicious party. For example, the TET link may be over a medium that decays very quickly over distance. In some embodiments, the TET link is used to pass an encryption key and/or to verify communications over the two-way radio channel. The TET channel may be authenticated. For example, authentication may include a minimum energy and/or power transfer.

Secret key generation for wireless channels

A method of operating a first node to generate a secret key for encrypting wireless transmissions between the first node and a second node. The method comprises receiving a first training signal comprising a plurality of subcarriers from the second node and constructing a matrix from the frequency responses of each of the plurality of subcarriers of the first training signal at the first node. A singular value decomposition of the matrix is computed; and a secret key is derived from one or more singular vectors of the singular value decomposition.