H04W12/047

Secure streaming of real-time location data between electronic devices

Embodiments described herein provide for system and methods to enable the secure streaming of real-time location data between electronic devices. One embodiment provides for a non-transitory machine-readable medium storing instructions to perform operations comprising creating record to specify a location streaming relationship between a first device registered with a first user account and a second device registered with a second online account, the record including a secret key. The record is stored to an online datastore and shared between the first user account and the second online account. The location data stream can be encrypted using the secret key stored in the record.

Multi-link wireless communications connections

A method includes establishing a multi-link security association between a transmitter upper Media Access Control (MAC) logic entity of a transmitter and a receiver upper MAC logic entity of a receiver. The transmitter includes one or more transmitter links. The receiver includes one or more receiver links.

Wireless communication terminal, access point, wireless communication system, wireless communication method, and recording medium

In a wireless communication terminal, a control circuit is configured to cause a wireless communicator to wirelessly connect to a first AP on the basis of authentication information of the first AP stored on a memory and is configured to execute authentication processing with the first AP on the basis of the authentication information of the first AP stored on the memory without executing setup processing when the control circuit selects a first mode. The control circuit is configured to start the setup processing with a second AP by using the wireless communicator when the control circuit selects the second mode. The control circuit is configured to cause the wireless communicator to wirelessly connect to the second AP and is configured to execute the authentication processing with the second AP on the basis of authentication information received from the second AP by the wireless communicator.

Key Negotiation Method and Electronic Device
20230017263 · 2023-01-19 ·

A key negotiation method and an electronic device are provided, and relate to the field of communications technologies. Specifically, the method includes: An IoT control device multicasts, in a first local area network, a discovery message that carries a first public key, and sends a second ciphertext to a first IoT device after receiving a first ciphertext and a second public key. After receiving a third ciphertext from the first IoT device, the IoT control device decrypts the third ciphertext based on a first session key, to obtain a second signature and second session information; verifies the second signature based on a long-term public key of the first IoT device; and performs encrypted communication with the first IoT device based on the first session key after the second signature is successfully verified.

Data sharding for transmission over a high generation cellular network
11706299 · 2023-07-18 · ·

Aspects of the disclosure relate to data sharding for transmission over a high generation cellular network. A computing platform may detect, via a communication network, transmission of data from a first computing device to a second computing device. Subsequently, the computing platform may intercept, prior to receipt of the transmission by the second computing device, the data. Then, the computing platform may shard the data into a first shard and a second shard. Then, the computing platform may identify, within the communication network, a first communication channel and a second communication channel. Then, the computing platform may send, to the second computing device, the first shard via the first communication channel, and the second shard via the second communication channel. Subsequently, the computing platform may merge, the first shard and the second shard, to reconfigure the data.

ACCESS CONTROL METHOD AND COMMUNICATIONS DEVICE
20230017260 · 2023-01-19 · ·

An access control method and a communications device are provided. The method includes: sending first information and/or first indication information to a first target end, where the first information includes at least one of the following: index information of a second authentication server, vendor-related information of the first communications device, and address-related information of the second authentication server; and the first indication information is used for requesting to obtain a credential related to a first network, or used to indicate that an access type is a restricted service.

AUTHENTICATION METHOD BETWEEN TERMINALS HAVING PROXIMITY COMMUNICATION FUNCTION AND TERMINALS IMPLEMENTING THE SAME METHOD
20230013613 · 2023-01-19 ·

An authentication method in a secure channel unused mode on a first terminal in which Fine Ranging (FiRa) applet drives according to an embodiment of the present disclosure includes generating a session basic information including a random value, transmitting the generated session basic information to a second terminal, generating session data including a session key from the generated session basic information using an authentication key pre-shared with the second terminal, and performing ultra-wide band (UWB) ranging with the second terminal using the generated session data.

SECURE DISTRIBUTED RADIO ACCESS NETWORKS
20230019807 · 2023-01-19 ·

Secure, distributed radio access networks are enabled, e.g., to facilitate network resilience and security. For instance, a device can comprise a processor, and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: in response an event being determined to have occurred that affects operation of a primary radio access network, activating an alternate radio access network via a group of mobile devices and re-routing communications from being communicated via a fixed location radio access network equipment of the primary radio access network to being communicated via the group of mobile devices of the alternate radio access network.

SECURE DISTRIBUTED RADIO ACCESS NETWORKS
20230019807 · 2023-01-19 ·

Secure, distributed radio access networks are enabled, e.g., to facilitate network resilience and security. For instance, a device can comprise a processor, and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: in response an event being determined to have occurred that affects operation of a primary radio access network, activating an alternate radio access network via a group of mobile devices and re-routing communications from being communicated via a fixed location radio access network equipment of the primary radio access network to being communicated via the group of mobile devices of the alternate radio access network.

Physical layer key based interleaving for secure wireless communication

A key-based interleaver for enhancement the security of wireless communication includes a physical layer communication channel key to provide security even when the software encryption key is compromised. A method of creating a secure communication link using a physical layer interleaving system includes implementing a key policy implementation that utilizes temporal dependency and interleaving bits using a flexible inter and intra-block data interleaver.