Patent classifications
H04W12/069
WIRELESS BATTERY MANAGEMENT SYSTEM SETUP
Aspects of this description provide for a computer program product comprising computer executable instructions. In at least some examples, the instructions are executable by a controller to cause the controller to broadcast, in a data frame, a scan request to a node, the scan request including a certificate of the controller and a public authentication key of the controller, receive, in the data frame, a scan response from the node, the scan response including a certificate of the node and a public authentication key of the node, and perform pairing between the controller and the node based on the public authentication key of the node and a private authentication key of the controller.
WIRELESS BATTERY MANAGEMENT SYSTEM SETUP
Aspects of this description provide for a computer program product comprising computer executable instructions. In at least some examples, the instructions are executable by a controller to cause the controller to broadcast, in a data frame, a scan request to a node, the scan request including a certificate of the controller and a public authentication key of the controller, receive, in the data frame, a scan response from the node, the scan response including a certificate of the node and a public authentication key of the node, and perform pairing between the controller and the node based on the public authentication key of the node and a private authentication key of the controller.
BLUETOOTH DEVICE AND BLUETOOTH GATEWAY
A Bluetooth device (702) is disclosed, the Bluetooth device being provisioned with a security credential (710) that is shared with an authentication server (706). The Bluetooth device comprises processing circuitry configured to use a Bluetooth pairing mechanism to establish a pairing with a Bluetooth gateway (704a-c) by establishing a shared secret key with the Bluetooth gateway and to perform an Extensible Authentication Protocol (EAP) authentication method towards the authentication server using the security credential, wherein performing the EAP authentication method comprises using the paired Bluetooth gateway to forward messages to and from the authentication server. The processing circuitry is further configured to bind the pairing established with the paired Bluetooth gateway to the performed EAP authentication method. Also disclosed are a Bluetooth gateway and methods performed by a Bluetooth device and a Bluetooth gateway.
BLUETOOTH DEVICE AND BLUETOOTH GATEWAY
A Bluetooth device (702) is disclosed, the Bluetooth device being provisioned with a security credential (710) that is shared with an authentication server (706). The Bluetooth device comprises processing circuitry configured to use a Bluetooth pairing mechanism to establish a pairing with a Bluetooth gateway (704a-c) by establishing a shared secret key with the Bluetooth gateway and to perform an Extensible Authentication Protocol (EAP) authentication method towards the authentication server using the security credential, wherein performing the EAP authentication method comprises using the paired Bluetooth gateway to forward messages to and from the authentication server. The processing circuitry is further configured to bind the pairing established with the paired Bluetooth gateway to the performed EAP authentication method. Also disclosed are a Bluetooth gateway and methods performed by a Bluetooth device and a Bluetooth gateway.
NETWORK ACCESS AUTHENTICATION PROCESSING METHOD AND DEVICE
Embodiments of the present disclosure provide a network access authentication processing method and device. The method includes: receiving a confirmation message sent by user equipment, the confirmation message carrying a first signature token generated by the user equipment according to a first Privacy enhanced Mobile Subscriber Identifier (PMSI); verifying whether the first signature token is valid; and when the first signature token is invalid, obtaining the PMSI to perform network access authentication on the user equipment.
NETWORK ACCESS AUTHENTICATION PROCESSING METHOD AND DEVICE
Embodiments of the present disclosure provide a network access authentication processing method and device. The method includes: receiving a confirmation message sent by user equipment, the confirmation message carrying a first signature token generated by the user equipment according to a first Privacy enhanced Mobile Subscriber Identifier (PMSI); verifying whether the first signature token is valid; and when the first signature token is invalid, obtaining the PMSI to perform network access authentication on the user equipment.
METHOD FOR AUTHENTICATION BETWEEN A CONTROL MODULE AND A LIGHTING MODULE FOR A MOTOR VEHICLE
A method for authentication between a control module and a lighting module for a motor vehicle, in which at least one of the two modules is a transmitter module, the other being a receiver module, the two modules comprising a unit for transmitting/receiving data and being linked by a data communication channel that enables the modules to exchange data. The method including transmitting of data describing at least one authentication factor from the transmitter module to the receiver module, verification of the authentication factor by means of a calculation unit, and abandoning communication, in the receiver module, with the transmitter module if the verification fails, or otherwise continuing communication.
DATA INFORMATION OBTAINING METHOD AND APPARATUS
This disclosure relates to method and apparatus for obtaining data information. The method includes: obtaining a capability invocation subscription request transmitted by a second function network element based on subscription request parameter information, the subscription request parameter information being determined according to authentication response parameter information, the authentication response parameter information being obtained by a network exposure function device performing authentication processing on a capability invocation request, and the capability invocation request being transmitted by the second function network element based on a first subscription rule; obtaining access parameter information from the subscription request parameter information, and performing subscription verification on the capability invocation subscription request based on the access parameter information; and generating capability invocation subscription response information for the capability invocation subscription request, and transmitting the capability invocation subscription response information to the second function network element.
DATA INFORMATION OBTAINING METHOD AND APPARATUS
This disclosure relates to method and apparatus for obtaining data information. The method includes: obtaining a capability invocation subscription request transmitted by a second function network element based on subscription request parameter information, the subscription request parameter information being determined according to authentication response parameter information, the authentication response parameter information being obtained by a network exposure function device performing authentication processing on a capability invocation request, and the capability invocation request being transmitted by the second function network element based on a first subscription rule; obtaining access parameter information from the subscription request parameter information, and performing subscription verification on the capability invocation subscription request based on the access parameter information; and generating capability invocation subscription response information for the capability invocation subscription request, and transmitting the capability invocation subscription response information to the second function network element.
CERTIFICATE BASED APPLICATION DESCRIPTORS FOR NETWORK SLICE SELECTION
Various aspects of the present disclosure generally relate to certificate based application descriptors for network slice selection. In some aspects, a user equipment (UE) may receive a first certificate associated with obtaining a network slice for executing an application. The UE may transmit, to a device, a request for the network slice with the first certificate, and receive an indication that the network slice is available to the UE for the application, based at least in part on the request. Numerous other aspects are provided.