Patent classifications
H04W12/04
METHOD AND DEVICE USED FOR WIRELESS COMMUNICATION
The present disclosure provides a method and a device used for wireless communications, comprising: transmitting a first transmission on a first SDU, including transmitting a first MAC PDU group; the first MAC PDU group at least comprises a first MAC PDU; receiving a first signaling and a first status report, the first signaling being used to indicate that a first ID is renewed as a second ID; the first status report is used to indicate that the first SDU is not received yet; and performing a second transmission on the first SDU, including transmitting a second MAC PDU group; the second MAC PDU group at least comprises a second MAC PDU; the first signaling is used to trigger the first status report. By transmitting the first SDU in a rational way, the present disclosure helps improve reliability and prevent risks in communications.
Mobile device-based dual custody verification using micro-location
A method is provided. The method includes receiving a request to conduct a transaction with a merchant, requesting approval of the request, receiving approval of the request, verifying the transaction, receiving a first data, receiving a second data, determining a first distance between the first computing device and the second computing device based on the first and second data, determining that the first distance between the first computing device and second computing device satisfies a first predetermined distance threshold, receiving a third data, the third computing device being associated with the second user, determining a second distance between the third computing device and the second computing device based on the third and second data, determining that the second distance between the third computing device and the second computing device satisfies a second predetermined distance threshold, and approving the transaction.
Mobile device-based dual custody verification using micro-location
A method is provided. The method includes receiving a request to conduct a transaction with a merchant, requesting approval of the request, receiving approval of the request, verifying the transaction, receiving a first data, receiving a second data, determining a first distance between the first computing device and the second computing device based on the first and second data, determining that the first distance between the first computing device and second computing device satisfies a first predetermined distance threshold, receiving a third data, the third computing device being associated with the second user, determining a second distance between the third computing device and the second computing device based on the third and second data, determining that the second distance between the third computing device and the second computing device satisfies a second predetermined distance threshold, and approving the transaction.
Power coupling modulation transmission
Embodiments of communication systems are disclosed for protecting communication between an implanted device ID and an external device ED. For example, a one way Transcutaneous energy transfer TET link may be used to secure two way communication over a radio channel. Optionally, the TET link may be protected from intrusion by a malicious party. For example, the TET link may be over a medium that decays very quickly over distance. In some embodiments, the TET link is used to pass an encryption key and/or to verify communications over the two-way radio channel. The TET channel may be authenticated. For example, authentication may include a minimum energy and/or power transfer.
Power coupling modulation transmission
Embodiments of communication systems are disclosed for protecting communication between an implanted device ID and an external device ED. For example, a one way Transcutaneous energy transfer TET link may be used to secure two way communication over a radio channel. Optionally, the TET link may be protected from intrusion by a malicious party. For example, the TET link may be over a medium that decays very quickly over distance. In some embodiments, the TET link is used to pass an encryption key and/or to verify communications over the two-way radio channel. The TET channel may be authenticated. For example, authentication may include a minimum energy and/or power transfer.
Secret key generation for wireless channels
A method of operating a first node to generate a secret key for encrypting wireless transmissions between the first node and a second node. The method comprises receiving a first training signal comprising a plurality of subcarriers from the second node and constructing a matrix from the frequency responses of each of the plurality of subcarriers of the first training signal at the first node. A singular value decomposition of the matrix is computed; and a secret key is derived from one or more singular vectors of the singular value decomposition.
Method and first base station for handling secondary cell group failure
A first base station (BS) transmitting a secondary node (SN) Addition Request message to a second BS for a communication device; receiving a SN Addition Request Acknowledge message from the second BS, wherein the SN Addition Request Acknowledge message comprises a first plurality of configurations which configure the communication device to communicate with the second BS and configure a data radio bearer (DRB) which is a SCG split bearer; transmitting a first message comprising the first plurality of configurations to the communication device, wherein the second BS communicates with the communication device according to the first plurality of configurations; receiving a second message indicating the SCG failure from the communication device; initiating a SN Modification procedure with the second BS to recover the SCG failure, or transmitting a third message configuring the DRB to be a master cell group bearer or a MCG split bearer to the communication device.
Method and first base station for handling secondary cell group failure
A first base station (BS) transmitting a secondary node (SN) Addition Request message to a second BS for a communication device; receiving a SN Addition Request Acknowledge message from the second BS, wherein the SN Addition Request Acknowledge message comprises a first plurality of configurations which configure the communication device to communicate with the second BS and configure a data radio bearer (DRB) which is a SCG split bearer; transmitting a first message comprising the first plurality of configurations to the communication device, wherein the second BS communicates with the communication device according to the first plurality of configurations; receiving a second message indicating the SCG failure from the communication device; initiating a SN Modification procedure with the second BS to recover the SCG failure, or transmitting a third message configuring the DRB to be a master cell group bearer or a MCG split bearer to the communication device.
Device independent encrypted content access system
Systems, devices, media, and methods are presented for retrieving authentication credentials and decryption keys to access remotely stored user-generated content. The systems and methods receive a first authentication credential and access a second authentication credential based on receiving the first authentication credential. The system and methods generate an authentication token and an encryption token. Based on the authentication token, the system and methods access a set of encrypted content and an encrypted content key. The systems and methods decrypt the encrypted content key using the encryption token and decrypt the set of encrypted content using the decrypted content key. At least a portion of the content is presented at the user device.
Key-derivation verification in telecommunications network
A telecommunications network includes a serving network and a home network. In some examples the serving network receives, from the home network, identity data associated with a network terminal. The serving network determines a tied key using a tying key derivation function (TKDF) based on the identity data, then prepares an authentication request based on the tied key and sends the request to the terminal. In some examples, the home network receives the identity data from the access network and determines a tied key using a TKDF. The home network then determines a confirmation message based on the first tied key. In some examples, the serving network receives the identity data from the home network, and receives a network-slice selector associated with the network terminal. The serving network determines a tied key using a TKDF based on the identity data and the network-slice selector.