H04W12/10

Global resource locator label
11579239 · 2023-02-14 · ·

A global resource locator (GRL) device can be used to track a physical asset. The GRL device can a semiconductor chip with a processor and a timing device. The semiconductor chip can generate a timing signal. The GRL device can include a blockchain, a communication device, and a memory in logical communication with the processor. The memory can store an identifier, a public key, a private key, and a hash. The communication device can communicate wirelessly with an authenticated radio source, the micro sized timing device, and the blockchain. Each authenticated radio source can be located at a respective reference location. The communication device can receive wireless timing signals from at least three authenticated radio sources. The GRL device can be affixed to a product.

Wireless security protocol

This disclosure relates to a data storage device. A data port transmits data between a host computer system and the data storage device over a data channel. The device repeatedly broadcasts advertising packets over a wireless communication channel different from the data channel. Each advertising packet comprises a random value and a message authentication code calculated based on the random value and an identity key. The identity key is readable by a device to be connected and in proximity of the data storage device out of band of the data channel and the communication channel. The identity key enables the device to be connected to verify the message authentication code based on the random value and the identity key to thereby authenticate the data storage device.

Decentralized robot cooperation platform

Systems and methods of the present disclosure leverage distributed ledger technology (DLT) to provide decentralized control of cooperative tasks performed by a plurality of robots. Characteristics of the plurality of robots may be stored in a distribute ledger, which may be provided by a blockchain or a distributed database system. When a service request is received, a set of tasks may be identified for providing the requested service and the robot characteristics recorded to the distributed ledger may be used to identify a list of candidate robots possessing characteristics corresponding to the set of tasks may be identified. A smart contract may be utilized to select one or more candidate robots for performing the task and to verify the selected robot(s) successfully completed the task. State information associated with operation of the selected robot(s) may be monitored to verify task completion.

Secure and private cloud based broadcast identification
11582575 · 2023-02-14 · ·

In one embodiment, a method includes storing, by a tracking server, a hash value for each of one or more tracking devices associated with the tracking server. The method includes receiving, at the tracking server from a user device, a hash value associated with a tracking device, the hash value computed based on a static value uniquely associated with the tracking device and a dynamic value maintained by the tracking device. The method includes identifying, by the tracking server, the tracking device based on a comparison between one of the stored hash values and the received hash value. The method includes updating, by the tracking server, one or more records associated with the identified tracking device based on the receiving the hash value.

Secure and private cloud based broadcast identification
11582575 · 2023-02-14 · ·

In one embodiment, a method includes storing, by a tracking server, a hash value for each of one or more tracking devices associated with the tracking server. The method includes receiving, at the tracking server from a user device, a hash value associated with a tracking device, the hash value computed based on a static value uniquely associated with the tracking device and a dynamic value maintained by the tracking device. The method includes identifying, by the tracking server, the tracking device based on a comparison between one of the stored hash values and the received hash value. The method includes updating, by the tracking server, one or more records associated with the identified tracking device based on the receiving the hash value.

Key-derivation verification in telecommunications network
11582231 · 2023-02-14 · ·

A telecommunications network includes a serving network and a home network. In some examples the serving network receives, from the home network, identity data associated with a network terminal. The serving network determines a tied key using a tying key derivation function (TKDF) based on the identity data, then prepares an authentication request based on the tied key and sends the request to the terminal. In some examples, the home network receives the identity data from the access network and determines a tied key using a TKDF. The home network then determines a confirmation message based on the first tied key. In some examples, the serving network receives the identity data from the home network, and receives a network-slice selector associated with the network terminal. The serving network determines a tied key using a TKDF based on the identity data and the network-slice selector.

Vehicle information communication system

A vehicle information communication system includes a center apparatus and a vehicle apparatus that includes a group of electronic control units (ECUs) and that sends vehicle configuration information including configuration information on the group of ECUs mounted in the vehicle to the center apparatus via wireless communications. The center apparatus performs a first determination of whether the vehicle configuration information received from the vehicle apparatus matches approved-configuration information registered in an approved-configuration database, and performs a second determination of whether software update data for at least one ECU of the group of ECUs mounted in the vehicle exists in an update database. When both the first and second determinations are true, the center apparatus sends the software update data for at least one ECU of the group of ECUs mounted in the vehicle to the vehicle apparatus via the wireless communications.

HEARING DEVICE WITH REMOTE FITTING, HEARING SYSTEM, AND RELATED METHODS
20230039340 · 2023-02-09 · ·

The present disclosure relates to methods and devices for a hearing system. A method, performed by a hearing device of a hearing system comprising a hearing device system and an external device, the hearing device system comprising the hearing device and a user accessory device with a user application installed thereon is disclosed, the method comprising receiving, from the user accessory device, secure hearing system data, the secure hearing system data comprising a data type identifier; determining a data type of the secure hearing system data based on the data type identifier; determining hearing system data by applying a security scheme to the secure hearing system data based on the data type; and operating the hearing device according to the hearing system data.

HEARING DEVICE WITH REMOTE FITTING, HEARING SYSTEM, AND RELATED METHODS
20230039340 · 2023-02-09 · ·

The present disclosure relates to methods and devices for a hearing system. A method, performed by a hearing device of a hearing system comprising a hearing device system and an external device, the hearing device system comprising the hearing device and a user accessory device with a user application installed thereon is disclosed, the method comprising receiving, from the user accessory device, secure hearing system data, the secure hearing system data comprising a data type identifier; determining a data type of the secure hearing system data based on the data type identifier; determining hearing system data by applying a security scheme to the secure hearing system data based on the data type; and operating the hearing device according to the hearing system data.

Integrated secure device manager systems and methods for cyber-physical vehicles

Systems and methods are described for a cyber-physical vehicle management system generated by an Integrated Secure Device Manager (ISDM) Authority configured to manage licensing and approval of Cyber-Physical Vehicle (CPV)s, a public/private key pair and a unique ID for the Authority, create a self-signed Authority token signed by the private key, send the Authority token to a plurality of ISDM Node device configured to verify Module device authenticity and in communication with the Authority, store, by each Node, the Authority token, and mark, by each Node, the Authority token as trusted.