Patent classifications
H04W12/043
BLUETOOTH DEVICE AND BLUETOOTH GATEWAY
A Bluetooth device (702) is disclosed, the Bluetooth device being provisioned with a security credential (710) that is shared with an authentication server (706). The Bluetooth device comprises processing circuitry configured to use a Bluetooth pairing mechanism to establish a pairing with a Bluetooth gateway (704a-c) by establishing a shared secret key with the Bluetooth gateway and to perform an Extensible Authentication Protocol (EAP) authentication method towards the authentication server using the security credential, wherein performing the EAP authentication method comprises using the paired Bluetooth gateway to forward messages to and from the authentication server. The processing circuitry is further configured to bind the pairing established with the paired Bluetooth gateway to the performed EAP authentication method. Also disclosed are a Bluetooth gateway and methods performed by a Bluetooth device and a Bluetooth gateway.
Information processing apparatus, information processing system, information processing method, and non-transitory storage medium
An information processing apparatus including a control unit configured to perform obtaining result data indicating a result of locking and unlocking performed by a locking and unlocking device that performs locking and unlocking based on authentication information obtained from a portable terminal carried by a user, and generating, based on the result data, proposal data including a proposal for a service to be provided to the user.
ON-DEMAND DRIVER SYSTEMS AND METHODS
Example on-demand driver (ODD) systems and methods are described herein. An example method includes generating, with an ODD system, a softkey for a vehicle associated with an agreement between a driver-in-need (DIN) and an ODD, monitoring, with the ODD system, a location of an ODD device carried by the ODD, and transmitting, with the ODD system, the softkey to the ODD device when the ODD device is detected as being within a proximity of the vehicle. In the example method, the softkey is used to unlock the vehicle.
Systems and methods for location-based automated authentication
Systems, methods, and apparatuses for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.
Systems and methods for location-based automated authentication
Systems, methods, and apparatuses for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.
CONFIGURING A REMOTE ELECTRONIC DEVICE BY A PEER ELECTRONIC DEVICE IN A NETWORKED ENVIRONMENT
A method for configuring multiple electronic devices in a batch, is described. The method can include initializing, by a first computing device a communication network based on a pre-defined configuration parameter. The pre-defined configuration parameter is associated with a first instance of an application on the first computing device. Further, the method includes identifying, by the first computing device, an initialization of a second instance of an application at a second computing device. In response to identifying the initialization of the second instance of the application at the second computing device, the method includes, sending, by the first computing device configuration settings for the second computing device over a secured communication network. In this regard, the configuration settings can comprise at least the pre-defined configuration parameter for configuring the second computing device.
EVENT DETECTION AND MANAGEMENT FOR QUANTUM COMMUNICATIONS
The present disclosure describes event detection and management for quantum communications in a communication network. The event detection and management for quantum communications in a communication network may be provided based on event-based interaction between quantum nodes of the communication network and a network controller of the communication network, such as where the quantum nodes detect events associated with quantum communications and report the events associated with quantum communications to the network controller and where the network controller receives the events associated with quantum communications from the quantum nodes and initiates event management operations based on the events associated with quantum communications. The event detection and management for quantum communications in a communication network may be provided for various aspects of quantum communications, such as for quantum channels configured to support quantum information transfers, quantum information transfers via quantum channels, quantum applications, and so forth.
METHOD AND APPARATUS FOR PROVIDING AKMA SERVICE IN WIRELESS COMMUNICATION SYSTEM
According to an embodiment of a present disclosure, a method performed by AKMA anchor function (AAnF) in a wireless communication system is provided. The method may include: receiving, from an application function (AF), a message for requesting authentication and key management for applications (AKMA) application key for a user equipment (UE); checking whether the AAnF provides AKMA service to the AF based on a local policy; and based on a result of the checking, determining whether to derive the requested AKMA application key for the UE.
Integration of Third-Party Encryption Key Managers with Cloud Services
A method for integrating third-party encryption managers with cloud services includes receiving, at data processing hardware, an operation request requesting a cryptographic operation on data comprising an encryption operation or a decryption operation. When the operation is an encryption operation, the method includes transmitting a data encryption key associated with the data to a remote entity. The remote entity encrypts the data encryption key with a key encryption key and transmits the encrypted data encryption key to the data processing hardware. When the operation is a decryption operation, the method includes transmitting the encrypted data encryption key to the remote entity which causes the remote entity to decrypt the encrypted data encryption key with the key encryption key and transmit the decrypted data encryption key and transmit to the data processing hardware.
METHOD FOR OBTAINING IDENTIFIER OF TERMINAL DEVICE, APPARATUS, AND SYSTEM
A method for obtaining an identifier of a terminal device includes a key management network element receiving, from a first terminal device, a first key request including a first identifier, where the first identifier is an anonymous identifier or a temporary identifier of a second terminal device. The key management network element sends, to a unified data management network element, a first request including the first identifier. The unified data management network element determines a SUPI of the second terminal device based on the first identifier, and sends, to the key management network element, a first response including the SUPI. In response to an authorization check performed on the second terminal device based on the SUPI succeeds, the key management network element sends a first key response to the first terminal device, where the first key response includes a secure communication parameter.