Patent classifications
H04W12/0471
PAIRING METHOD APPLIED TO SHORT-RANGE COMMUNICATION SYSTEM AND WIRELESS DEVICE
Embodiments of this application disclose a pairing method applied to a short-range communication system and a wireless device in the field of wireless communication. The method includes: obtaining, by a first wireless device, a first password, where the first password is shared by the first wireless device and a second wireless device; and pairing, by the first wireless device, with the second wireless device based on a password-based authenticated key exchange (PAKE) protocol and by using the first password as an encryption password in a key exchange process.
Terminal verification method, and AP device, terminal and system
Disclosed are a terminal verification method, an AP device, a terminal and a system, wherein the AP device is an encrypted AP device. The method comprises: receiving a connection request sent by a first terminal, wherein the connection request comprises identification information of the first terminal; querying an authorization list according to the identification information of the first terminal, wherein the authorization list includes identification information of terminals located within a preset password-free range; and returning an authorization response to the first terminal when the authorization list includes the identification information of the first terminal, wherein the authorization response is used for instructing the first terminal to establish a network connection with the AP device. The AP device does not need to verify a first terminal located within a password-free range, thereby reducing the number of first terminals that require identity verification within a WLAN coverage range, reducing the resource consumption of the identity verification for the AP device, and enabling the use of a WLAN to be more convenient.
Terminal verification method, and AP device, terminal and system
Disclosed are a terminal verification method, an AP device, a terminal and a system, wherein the AP device is an encrypted AP device. The method comprises: receiving a connection request sent by a first terminal, wherein the connection request comprises identification information of the first terminal; querying an authorization list according to the identification information of the first terminal, wherein the authorization list includes identification information of terminals located within a preset password-free range; and returning an authorization response to the first terminal when the authorization list includes the identification information of the first terminal, wherein the authorization response is used for instructing the first terminal to establish a network connection with the AP device. The AP device does not need to verify a first terminal located within a password-free range, thereby reducing the number of first terminals that require identity verification within a WLAN coverage range, reducing the resource consumption of the identity verification for the AP device, and enabling the use of a WLAN to be more convenient.
Electronic device for receiving data packet in Bluetooth network environment and method thereof
An electronic device for receiving data packets in a Bluetooth environment is provided. The electronic device includes a wireless communication circuitry configured to support a Bluetooth protocol. The wireless communication circuitry is configured to establish a first link with a first external electronic device, synchronize a secret key generation scheme with the first external electronic device based on information obtained while establishing the first link, receive page information transmitted from a second external electronic device, based on Bluetooth address information of the first external electronic device, the Bluetooth address information being obtained while establishing the first link, generate a link key used for a second link between the first external electronic device and the second external electronic device, based on the synchronized secret key generation scheme, and receive an encrypted data packet transmitted over the second link from the second external electronic device using the generated link key.
Key obtaining method and device, and communications system
A method for security handling in a mobility of a terminal device, where the method includes: a target access and mobility management function (AMF) entity receiving a first message for registering a terminal device; the target AMF entity sending a second message to a source AMF entity after receiving the first message; the source AMF entity deriving a first key based on a key between the source AMF entity and the terminal device; the source AMF entity sending the first key to the target AMF entity; the target AMF entity determining to use the first key based on security related information after receiving the first key; and the target AMF entity determining a communication key between the target AMF entity and the terminal device based on the first key after determining to use the first key.
Key obtaining method and device, and communications system
A method for security handling in a mobility of a terminal device, where the method includes: a target access and mobility management function (AMF) entity receiving a first message for registering a terminal device; the target AMF entity sending a second message to a source AMF entity after receiving the first message; the source AMF entity deriving a first key based on a key between the source AMF entity and the terminal device; the source AMF entity sending the first key to the target AMF entity; the target AMF entity determining to use the first key based on security related information after receiving the first key; and the target AMF entity determining a communication key between the target AMF entity and the terminal device based on the first key after determining to use the first key.
Enhanced and/or more efficient fixed-mobile convergence capabilities and/or device discovery capabilities within a telecommunications network
A method for providing fixed-mobile convergence capabilities and/or device discovery capabilities within a telecommunications network includes: a specific client device or user equipment is connected to or connects to the home gateway device in order to connect to the telecommunications network; the home gateway device uses the connection to the specific client device or user equipment to initiate an exchange of messages according to an authentication or key exchange protocol, wherein the authentication or key exchange protocol is an extensible authentication protocol (EAP) or an enhanced authentication and key agreement (AKA), wherein identity information of the specific client device or user equipment is transmitted to the home gateway device as part of at least one message of the authentication or key exchange protocol; and the authentication or key exchange protocol is prematurely terminated.
Enhanced and/or more efficient fixed-mobile convergence capabilities and/or device discovery capabilities within a telecommunications network
A method for providing fixed-mobile convergence capabilities and/or device discovery capabilities within a telecommunications network includes: a specific client device or user equipment is connected to or connects to the home gateway device in order to connect to the telecommunications network; the home gateway device uses the connection to the specific client device or user equipment to initiate an exchange of messages according to an authentication or key exchange protocol, wherein the authentication or key exchange protocol is an extensible authentication protocol (EAP) or an enhanced authentication and key agreement (AKA), wherein identity information of the specific client device or user equipment is transmitted to the home gateway device as part of at least one message of the authentication or key exchange protocol; and the authentication or key exchange protocol is prematurely terminated.
Secure streaming of real-time location data between electronic devices
Embodiments described herein provide for system and methods to enable the secure streaming of real-time location data between electronic devices. One embodiment provides for a non-transitory machine-readable medium storing instructions to perform operations comprising creating record to specify a location streaming relationship between a first device registered with a first user account and a second device registered with a second online account, the record including a secret key. The record is stored to an online datastore and shared between the first user account and the second online account. The location data stream can be encrypted using the secret key stored in the record.
Secure streaming of real-time location data between electronic devices
Embodiments described herein provide for system and methods to enable the secure streaming of real-time location data between electronic devices. One embodiment provides for a non-transitory machine-readable medium storing instructions to perform operations comprising creating record to specify a location streaming relationship between a first device registered with a first user account and a second device registered with a second online account, the record including a secret key. The record is stored to an online datastore and shared between the first user account and the second online account. The location data stream can be encrypted using the secret key stored in the record.