Patents Issued in September 14, 2023
-
Publication number: 20230292086Abstract: Techniques for context-based display of content and alert based on distance on a multi-display system are described. For instance, the described techniques can be implemented to determine a device context based on one or more of a first instance of media content displayed on a first display device positioned at a first surface of a client device or an environment in which the client device is positioned. Based on the device context, the described techniques enable output of a second instance of media content via a second display device positioned at a second surface of the client device.Type: ApplicationFiled: March 8, 2022Publication date: September 14, 2023Applicant: Motorola Mobility LLCInventors: Rahul Bharat Desai, Amit Kumar Agrawal
-
Publication number: 20230292087Abstract: An apparatus and method that determine a proximity between a first mobile device and a second mobile device, receive anonymized location information associated with the first mobile device and the second mobile device, respectively, select a portion of the anonymized location information that is within a first predetermined distance for each of the first mobile device and the second mobile device, respectively, transform the selected portion of the anonymized location information into approximate location probability densities for each of the first mobile device and the second mobile device, respectively, select pairs of anonymized location information from the approximate location probability densities, associated with the first and second mobile devices, respectively, and determine a distribution of distances between the selected pairs of anonymized location information associated with the first and second mobile devices, respectively, and determine a density of distances from the determined distribution ofType: ApplicationFiled: March 10, 2022Publication date: September 14, 2023Inventors: Jacqueline Barbieri, Jared Campbell, Forrest Crawford, Patrick Kenney, Thomas Valleau
-
Publication number: 20230292088Abstract: A method for determining proximity comprises sending a wireless signal from a first mobile tag (120a) of a plurality of mobile tags (120), the wireless signal communicating identification information associated with the first mobile tag (120a). The wireless signal is received at a second mobile tag (120b) of the plurality of mobile tags (120), and proximity data comprising the identification information is stored in a memory (127b) of the second mobile tag (120b). The proximity data is sent from the second mobile tag (120b) to a mobile communication device (110) using a first wireless protocol, is received at a mobile communication device (110), and is stored in a memory (117) of the mobile communication device (110). The proximity data is sent from the mobile communication device (110) to a server (130) using a second wireless protocol, and the proximity data is stored in a memory (137) of the server (130).Type: ApplicationFiled: July 2, 2021Publication date: September 14, 2023Applicant: Forkbeard Technologies ASInventors: Mattheus Franciscus Albertus Ten Veldhuis, Endre BAKKA, Cyril ANTILLE, Wilfred Edwin BOOIJ
-
Publication number: 20230292089Abstract: A method of monitoring the proximity of two or more monitoring devices. The method includes defining a series of subspaces within the space containing the devices and determining the subspace containing the location of each device. The method also includes subscribing each device to one or more subspaces and publishing the presence of each device to other devices that are subscribed to the subspace containing the device’s location. The series of subspaces are defined by a grid.Type: ApplicationFiled: August 2, 2021Publication date: September 14, 2023Applicant: K-SAFE LIMITEDInventor: Kirk R. RYAN
-
Publication number: 20230292090Abstract: An electronic device and a method for generating personal mobility device-usage recommendations based on user activity tracking is provided. The electronic device monitors a first set of activities associated with a user. The electronic device determines first information indicating a first time period associated with the monitored first set of activities. The electronic device receives second information indicating a second time period associated with a usage of a personal mobility device to perform a second set of activities. The electronic device compares the determined first information with the received second information. The first set of activities are associated with the second set of activities. The electronic device further generates recommendations associated with the usage of the personal mobility device by the user, based on the comparison of the determined first information with the received second information.Type: ApplicationFiled: March 10, 2022Publication date: September 14, 2023Inventor: Christopher John Tarchala
-
Publication number: 20230292091Abstract: Various exemplary embodiments include a method for presence detection based on three-dimensional localization of electronic labels, comprising placing one or more fixed anchor electronic labels in known positions in three-dimensional space, sending data packets via radio frequency signals from one or more unknown positioned electronic labels, wherein the radio frequency signals are set to reach preset maximum distances, the data packets from each of the one or more unknown positioned electronic labels including identifying data of the particular unknown positioned electronic label it originates from, receiving the data packets signals by the one or more fixed anchor electronic labels, and assuming, based on the preset maximum distances, a maximum distance position, of the one or more unknown positioned electronic labels from which the data packets where received, from each of the one or more fixed anchor electronic labels that received the radio frequency signals.Type: ApplicationFiled: March 3, 2023Publication date: September 14, 2023Inventors: Tengfei Chang, Osama Khan
-
Publication number: 20230292092Abstract: Provided are a method and device for transmitting/receiving multicast/broadcast service (MBS) data in an NR radio access network. The method of UE for receiving MBS data may include receiving, from a base station, configuration information for receiving MBS session data; based on the configuration information, configuring a MBS radio bearer for receiving the MBS session data; and receiving a MAC protocol data unit (PDU) in which two or more mutually different logical channels associated with the same group-radio network temporary identifier (G-RNTI) are multiplexed.Type: ApplicationFiled: July 22, 2021Publication date: September 14, 2023Applicant: KT CORPORATIONInventor: Sung-pyo HONG
-
Publication number: 20230292093Abstract: The invention relates to a method for configuring converters for sensors and displays and in particular to a sensing and displaying system comprising a sensor which senses information and delivers information data to a converter of claim 1 when in operation, whereby said converter converts said information data to display data and delivers said display data to a display when in operation and wherby said converter contains a microprocessor as a controller and a first NFC communication module which is connected to said microprocessor and whereby said microprocessor contains modifiable instructions to run said microprocessor and said converter and whereby said modifiable instructions are adapted to be modified through input data which can be delivered to said microprocessor through said NFC communication channel; wherein the function of said converter can be adapted according to an instruction App which can be loaded into a mobile device or mobile phone which employs a second NFC communication module, which wilType: ApplicationFiled: May 4, 2020Publication date: September 14, 2023Inventors: Martin EBNETER, Markus HASLER
-
Publication number: 20230292094Abstract: A method and a device are disclosed including one or more plug-in or Add-on Software Components (ASC) provided by a Social Business Platform (SBP) to deliver configuration information for the integration of various applications, services, and functionality from other platforms in an integrated environment. Each ASC may deliver a particular type of configuration information usable to configure and/or integrate services from various platforms, the services including data tiles and data streams, storage and document management services, single-function applications, core applications like communication and task management services, and other application-specific add-ons. In various embodiments, the configuration information may be distributed as packages of one or more files, which describe the configuration to be applied to the integrated services.Type: ApplicationFiled: November 2, 2022Publication date: September 14, 2023Applicant: Jive Software, Inc.Inventors: Edward John Venaglia, Murali V. Ponnuraj, Alberto Aron Cirilo Racho, Benjamin Gene Cheung
-
Publication number: 20230292095Abstract: Methods and systems are provided for auto-configuring a newly purchased user equipment (UE) device with content consumption material that is associated with a user. These methods and systems are provided by way of receiving, in response to the user having purchased the UE device, purchase information (e.g., a credit card number) and a UE device identifier (e.g., a serial number of a purchased UE device). After receipt of this information, a database is searched to identify a user account that is associated with the purchase information. The user account identifies content consumption material that has been processed by other UE devices to enable the user to consume content. A communication is then transmitted to the UE device that causes the UE device to be configured with the identified content consumption material.Type: ApplicationFiled: May 18, 2023Publication date: September 14, 2023Inventor: Gregory James Lundell
-
Publication number: 20230292096Abstract: A device includes a BLUETOOTH low energy (BLE) link layer (LL) controller configured to maintain a link cluster including multiple links between the device and one or more connected devices that share parameters associated with the link cluster and to process data associated with the links of the link cluster at a LL. The links of the link cluster established according to a BLE communication standard. The device further includes or is coupled to BLE physical link (PHY) interfaces coupled to the BLE LL controller and configured to exchange the data on different links of the link cluster at different respective signal frequencies, interface with the BLE LL controller, and process the data at a PHY layer.Type: ApplicationFiled: May 16, 2023Publication date: September 14, 2023Inventors: Yaron ALPERT, Yuval MATAR
-
Publication number: 20230292097Abstract: The described technology is generally directed towards an adapting radio access network coverage for location-based alerts. A group of cells and/or cell sectors can be selected for sending an alert, according to selection techniques described herein. The selection techniques can provide a target level of cellular coverage for a geographic area, while avoiding over-inclusion of cells and consequent dissemination of alerts to subscribers outside the geographic area. The target level of coverage can comprise a desired amount of service overlap, to achieve a corresponding level of confidence that subscribers within the geographic area will receive an alert. The selection techniques can furthermore close identified coverage gaps within the geographic area.Type: ApplicationFiled: March 8, 2022Publication date: September 14, 2023Inventors: Anwar Syed Aftab, Manoop Talasila, Lorraine Welch
-
Publication number: 20230292098Abstract: Apparatuses, methods, and systems are disclosed for sidelink device discovery. One method includes transmitting, at a first sidelink device and over a sidelink interface, a periodic discovery message for performing discovery of at least one second sidelink device. The method includes discovering the at least one second sidelink device over the sidelink interface. The method includes transmitting at least one source layer 2 identifier of the at least one second sidelink device discovered by the first sidelink device to a third wireless device.Type: ApplicationFiled: August 6, 2021Publication date: September 14, 2023Inventors: Karthikeyan Ganesan, Prateek Basu Mallick, Joachim Loehr, Ravi Kuchibhotla
-
Publication number: 20230292099Abstract: A method includes receiving, by a user equipment (UE) and through Radio Resource Control (RRC) signaling, information of a resource pool for a D2D communication, wherein the information of the resource pool comprises information of a discovery subframe in which a D2D discovery signal is to be communicated, determining that in the discovery subframe, the D2D discovery signal is prioritized over a communication with an evolved NodeB (eNB) unless the communication with the eNB is associated with a random access (RA) procedure, transmitting a RA preamble through a Physical Random Access Channel (PRACH), determining whether the discovery subframe corresponds to a RA subframe in which a RA response for the UE is to be monitored, and in response to determining that the discovery subframe corresponds to the RA subframe, monitoring, by the UE, the RA response during the discovery subframe.Type: ApplicationFiled: April 29, 2023Publication date: September 14, 2023Inventor: Dong Hyun PARK
-
Publication number: 20230292100Abstract: In order to provide the communication services to a user equipment comprising or applying secure edge protection proxy authentication: in a first step, a network function of a visited telecommunications network receives a request related to the user equipment, triggering a message towards a third secure edge protection proxy entity or functionality; and in a second step, the third secure edge protection proxy entity or functionality accesses a first secure edge protection proxy entity or functionality in an authenticated manner such that a message related to a second network identifier information is able to be sent, by the visited telecommunications network, to a network function in a first telecommunications network and accepted by the first telecommunications network.Type: ApplicationFiled: March 7, 2023Publication date: September 14, 2023Inventors: Josep COLOM IKUNO, Sven LACHMUND, Dieter GLUDOVACZ, Mari MELANDER, Roland JESSKE, Johannes ACHTER
-
Publication number: 20230292101Abstract: Internet gateway provisioning and evaluation of embedded subscriber identity module (eSIM) privileges is provided. The Internet gateway receives, from a device, a request to provision an embedded subscriber identity module (eSIM) of the device. The Internet gateway, in response to receiving the request to provision the eSIM of the device, causes the eSIM of the device to be provisioned with a profile. Provisioning the eSIM gives the device an ability to authenticate with a base station for communicating, via the base station, over a cellular communication protocol. The Internet gateway, after causing the eSIM to be provisioned, determines whether at least one criterion is met. The at least one criterion is for retaining or denying the ability of the device to authenticate with the base station. The Internet gateway, sends data, to a server, indicating that the at least one criterion is met.Type: ApplicationFiled: May 19, 2023Publication date: September 14, 2023Inventor: Abeir Dev
-
Publication number: 20230292102Abstract: A method for initiating an MCData communication within a regroup of communication groups, the method being implemented by a network according to the 3GPP MCS standard, wherein an MCData communication may include short data messages or file distribution. In addition, some information is added in the different transmissions to allow additional verifications by the different entities.Type: ApplicationFiled: March 13, 2023Publication date: September 14, 2023Inventors: Olivier PATEROUR, François PIROARD
-
Publication number: 20230292103Abstract: A network function selectively supports a mobile device with network settings appropriate for the device context of the mobile device. The network function obtains a device profile for the mobile device, which identifies multiple device groups, with each device group being associated with a corresponding set of network settings. The network function selects a device group among the device groups in the device profile based on a device context of the mobile device. Responsive to a notification of the mobile device in a different device context, the network function supports the mobile device with a different set of network settings that cause a Session Management Function (SMF) to reconfigure the user plane for the mobile device.Type: ApplicationFiled: May 18, 2023Publication date: September 14, 2023Inventors: Aditya Prakash, Ravi Shekhar, Vimal Srivastava
-
Publication number: 20230292104Abstract: A wireless communication device controls Multiple Input Multiple Output (MIMO) layers that use a radio band. The wireless communication device determines radio band status for the radio band. The wireless communication device wirelessly indicates the radio band status for the radio band to a wireless access node. The wireless access node selects a number of the MIMO layers based on the radio band status for the radio band. The wireless communication device wirelessly receives signaling from the wireless access node that indicates the number of the MIMO layers. The wireless access node wirelessly receives user data from the wireless access node over the radio band using the number of MIMO layers in response to the signaling.Type: ApplicationFiled: April 25, 2023Publication date: September 14, 2023Inventor: Sreekar Marupaduga
-
Publication number: 20230292105Abstract: A wireless device system can include lighting devices, sensing devices, and other wireless devices in a wireless mesh local area network. The devices are configured for rapid provisioning with provisioned site network data by using a process in which each device stores data for a default provisioning network, and a provisioning device, for example a smart phone or other mobile device, is used to wirelessly connect with at least one of the devices in the default provisioning network, enabling distant wireless devices to be reached by relay of messages in the default provisioning network. Devices can be individually provided a new network address, for example, from the provisioned site network data, and all devices are provided remaining data from the provisioned site network data using the mesh network broadcast feature, thus provisioning and switching devices near simultaneously from the default provisioning network to the provisioned site network.Type: ApplicationFiled: March 9, 2022Publication date: September 14, 2023Inventors: Benjamin Chen, Yun Fei Xu, Xian Long Ding
-
Publication number: 20230292106Abstract: A device information processing system includes a server and a device information processing apparatus, and the server acquires device identification information including an individual identification code unique to a device, and class identification information identifying a class identification code unique to a device class, and the device information processing apparatus receives the device identification information from the server, acquires the device identification information that fulfills a condition, extracts the class identification information from the device identification information, acquires a class identification code that is identified by the class identification information, and acquires configuration entries of a device corresponding to the class identification code.Type: ApplicationFiled: March 7, 2023Publication date: September 14, 2023Applicant: BUFFALO INC.Inventor: Akihiro ITO
-
Publication number: 20230292107Abstract: Systems, methods, and devices that relate to enabling roaming users to use various communication services by assigning temporary local numbers are disclosed. In one example aspect, a method for wireless communication includes entering a visited network by a roaming device. The roaming device has a primary number associated with its home network. The method includes requesting a local number associated with the visited network by the roaming device and performing a communication using the local number associated with the visited network.Type: ApplicationFiled: March 10, 2022Publication date: September 14, 2023Inventors: Asma Perveen Ahmad, Raymond T. Ball, Nassereddine Sabeur, Shujaur R. Mufti, Saqib Badar
-
Publication number: 20230292108Abstract: Technologies and techniques for controlling communication between a vehicle and a backend device in a vehicle-to-cloud-system. A message may be sent from the vehicle to the backend device, and a timer is set for receiving an acknowledgment from the backend device at the vehicle that the message was successfully received. The message may be resent from the vehicle to the backend device when no acknowledgment from the backend device was received at the vehicle, or when an acknowledgment from the backend device does not correspond to the message sent from the vehicle to the backend device. Different schedules may be configured for receiving the acknowledgment and resending the message from the vehicle to the backend device, according to different settings.Type: ApplicationFiled: July 9, 2021Publication date: September 14, 2023Inventors: Jan Rademakers, Caroline Pueschel-Bahrdt
-
Publication number: 20230292109Abstract: In a mobile cellular network, a mobile network operator (MNO) or other entity can specify whether a user equipment (UE) is to utilize either a concealed identifier (e.g., a subscription concealed identifier (SUCI)) calculated by a universal subscriber identity module (USIM) of a universal integrated circuit card (UICC) or a concealed identifier calculated by mobile equipment (ME) of the UE that is separate from the UICC and USIM. In the event that a USIM-calculated concealed identifier is specified for use but the USIM fails in generation of a concealed identifier, the UE can utilize one or more failure recovery procedures to attempt completion of attachment of the UE to the same network or a different network to help ensure that the UE does not remain attached to a network without access to services of the network due to authentication failure.Type: ApplicationFiled: August 6, 2021Publication date: September 14, 2023Inventors: Po-Ying Chuang, Huang-Da Chen, Hsin-Liang Lin
-
Publication number: 20230292110Abstract: The method for programming a lighting device via encrypted communications includes pairing the lighting device with a user device to connect first radio frequency (RF) communications, receiving information necessary for second encrypted RF communications by a first memory of the lighting device via the first RF communications, connecting second encrypted RF communications between the lighting device and the user device by using the information necessary for the second encrypted RF communications, and receiving encrypted lighting device setting information via the second encrypted RF communications.Type: ApplicationFiled: March 1, 2023Publication date: September 14, 2023Inventor: Sun Ik KIM
-
Publication number: 20230292111Abstract: A method implemented by a client transmitting entity included in a 3GPP MCS (3rd Generation Partnership Program Mission Critical Services) standard network, the client transmitting entity being configured to transmit a plurality of contents intended for at least one client receiving entity included in the network, the client transmitting entity and the client receiving entity being affiliated with a same communication group, the method including generating, by the client transmitting entity, a group user key identifier, the group user key identifier being specific to the communication group and being used to encrypt the content, the generation being repeated each time a predetermined event takes place.Type: ApplicationFiled: March 8, 2023Publication date: September 14, 2023Inventors: Louis GRANBOULAN, Olivier PATEROUR, François PIROARD
-
Publication number: 20230292112Abstract: The present disclosure realtes to a pre-5th generation (5G) or 5G communication system to be provided for supporting higher data rates beyond 4th-generation (4G) communication system such as long term evolution (LTE). In an embodiment, a method, for managing an Authentication and Key Management for Applications (AKMA) service for a User Equipment (UE) in a communication system is disclosed. The method includes determining, by a network function, that the UE is not allowed to utilize the AKMA service, in response to detecting at least one condition associated with the UE. The method includes transmitting, by the network function, a request to an AKMA Anchor Function (AAnF) for deleting an AKMA context corresponding to the UE from a memory associated with the AAnF. The method includes deleting, by the AAnF, the AKMA context corresponding to the UE from the memory.Type: ApplicationFiled: July 20, 2021Publication date: September 14, 2023Inventors: Varini GUPTA, Rajavelsamy RAJADURAI, Lalith KUMAR, Kundan TIWARI, Rajendran ROHINI, Nivedya Parambath SASI
-
Publication number: 20230292113Abstract: A method implemented by a client transmitting entity included in a network according to the 3GPP MCS standard, the client transmitting entity being configured to transmit content intended for a client receiving entity included in the network and being affiliated with a same communication group, the method including selecting a security context from among: a security context with endpoint diversity formed by: a long master key identifier formed by the GMK-ID and the DMK-ID, or a short master key identifier formed by the GMK-ID or a short master key identifier formed by the GUK-ID or no master key identifier. A security context without endpoint diversity formed by: a short master key identifier formed by the GMK-ID or no master key identifier.Type: ApplicationFiled: March 8, 2023Publication date: September 14, 2023Inventors: Louis GRANBOULAN, Olivier PATEROUR, François PIROARD
-
Publication number: 20230292114Abstract: Apparatuses, methods, and systems are disclosed for securing communications between user equipment devices. One apparatus includes a processor that derives, at a first user equipment (“UE”) device in communication with a mobile wireless communication network, a security key for securing communications between the first UE and a second UE via the mobile wireless communication network, the security key derived based on at least one parameter associated with the first UE and the second UE. The processor establishes a secure communication between the first UE and the second UE via a first network function of the mobile wireless communication network using the derived security key.Type: ApplicationFiled: August 6, 2021Publication date: September 14, 2023Inventors: Andreas Kunz, Sheeba Backia Mary Baskaran, Dimitrios Karampatsis
-
Publication number: 20230292115Abstract: There is provided an apparatus for a communication network comprising means for generating a subscription concealed identifier, SUCI, comprising a protection scheme identifier and a home network public key identifier. At least one of: a part of the protection scheme identifier and a part of the home network public key identifier comprises a version number of the at least one of: the protection scheme identifier and the home network public key identifier, correspondingly.Type: ApplicationFiled: March 2, 2023Publication date: September 14, 2023Inventor: Ranganathan MAVUREDDI DHANASEKARAN
-
Publication number: 20230292116Abstract: Methods in a wireless communication network may include providing a first authentication key, and deriving a second authentication key based on the first authentication key, with the second authentication key being associated with the wireless terminal. Responsive to deriving the second authentication key, a key response message may be transmitted including the second authentication key and/or an EAP-Finish/Re-auth message. Some other methods in a wireless communication network may include receiving a key response message including a core network mobility management authentication key and an EAP-Finish/Re-auth message. Responsive to receiving the key response message, the network may initiate transmission of an EAP-Finish/Re-auth message and/or a freshness parameter used to derive the core network mobility management authentication key from the wireless communication network to the wireless terminal responsive to the key response message. Related wireless terminal methods are also discussed.Type: ApplicationFiled: May 16, 2023Publication date: September 14, 2023Applicant: Telefonaktiebolaget LM Ericsson (publ)Inventor: Monica WIFVESSON
-
Publication number: 20230292117Abstract: Embodiments are disclosed for a group security scheme for an autonomous vehicle engaged in a collaborative machine learning approach. As an example, a method comprises: generating, in a vehicle, a digital signature based on a first key and a second key, both of the first key and the second key received from a group manager, and transmitting a message signed with the digital signature to a collaborator, the message including coefficients of a local machine learning model of the vehicle. In this way, an accuracy of the local machine learning model of the vehicle may be increased, while a privacy of the vehicle is increased.Type: ApplicationFiled: September 15, 2020Publication date: September 14, 2023Inventor: Sharath Yadav Doddamane Hemantharaja
-
Publication number: 20230292118Abstract: The present invention discloses a system (100) and method for remote allocation and deallocation of NAS stacks to IoT devices (106). The system (100) comprises at least one user device (102) used by a user (104) to control at least one IoT device (106), a server (108), abase station (114) and a core network (116). Each IoT device (106) is configured to login to the server (108), upon which the server (108) allocates a remote NAS stack to the IoT device (106). The allocated remote NAS stack communicates with the core network (116) through the base station (114), and thus enables the IoT device (106) to utilize the cellular network as per 3GPP and become a 3GPP compliant device.Type: ApplicationFiled: February 24, 2023Publication date: September 14, 2023Inventors: Surya Patar MUNDA, Uday Govind JOSHI
-
Publication number: 20230292119Abstract: A technique for generating a diversified encryption key for a contactless legacy magnetic stripe card is disclosed. The diversified key can be generated using a master key, a key diversification value and an encryption algorithm. In one example embodiment, the key diversification value can be provided by the user as a fingerprint, numeric code or photo. The user can provide the key diversification value to the card or a cellphone. The card can generate the diversified key using the user provided key diversification value. The card or the cellphone can transmit the user provided diversification value to the server and the server can regenerate the diversified key using the user provided diversification value.Type: ApplicationFiled: March 22, 2023Publication date: September 14, 2023Inventors: Evan LERNER, Lara MOSSLER
-
Publication number: 20230292120Abstract: Aspects of the present disclosure involve systems, methods, devices, and the like for user authentication. In one embodiment, the user authentication occurs using a multi-provider platform. The multi-provider platform enables the use and retrieval of user information from the given provider for the use and assessment of information associated with the user. User information may also be received over a web link communicated at least in part by a risk checkpoint component to a user device, wherein the user information received and that retrieved may be jointly used for determining user authentication.Type: ApplicationFiled: February 6, 2023Publication date: September 14, 2023Inventor: Rahul Nair
-
Publication number: 20230292121Abstract: Systems and methods that provide NAS security protection for mobile networks. In one embodiment, a network element of a mobile network performs a NAS procedure in multiple phases to establish a NAS communication session with User Equipment (UE) when no NAS security context exists. For a first phase, the network element receives an initial NAS message from the UE populated with a subset of NAS protocol Information Elements (IEs) designated for security-related handling, selects a NAS security algorithm for the NAS security context, and sends a response to the UE that indicates the NAS security algorithm. For a second phase, the network element receives a subsequent NAS message from the UE having a NAS message container that contains the initial NAS message populated with each of the NAS protocol IEs for the NAS procedure, and decrypts the NAS message container of the subsequent NAS message using the NAS security algorithm.Type: ApplicationFiled: May 13, 2023Publication date: September 14, 2023Inventor: Jennifer LIU
-
Publication number: 20230292122Abstract: Presented herein are techniques to facilitate fast roaming between a mobile network operator-public (MNO-public) wireless wide area (WWA) access network and an enterprise private WWA access network. In one example, a method is provided that may include generating, by an authentication node, authentication material for a user equipment (UE) based on the UE being connected to a public WWA access network, wherein the public WWA access network is associated with a mobile network operator, and the authentication node and the UE are associated with an enterprise entity; obtaining, by the authentication node, an indication that the UE is attempting to access a private WWA access network associated with the enterprise entity; and providing, by the authentication node, the authentication material for the UE, wherein the authentication material facilitates connection establishment between the UE and the private WWA access network.Type: ApplicationFiled: May 16, 2023Publication date: September 14, 2023Inventors: Srinath Gundavelli, Indermeet Singh Gandhi, Oliver James Bull, Louis Gwyn Samuel, Mark Grayson
-
Publication number: 20230292123Abstract: Blockchain technology is used to provide distributed authentication, entitlements and trust among different virtual Radio Access Network (vRAN) elements. An enterprise blockchain with interfaces enables multi-vendor vRAN deployment across multiple service providers. In another embodiment, a method is provided for authenticating entities in a virtualized radio access network to ensure various entitles are in fact entitled to participate in various radio access network operations.Type: ApplicationFiled: May 22, 2023Publication date: September 14, 2023Inventors: Om Prakash Suthar, Rajiv Asati, Santanu Dasgupta
-
Publication number: 20230292124Abstract: In a wireless communication network, a wireless access node receives an encrypted slice certificate from a wireless user device and transfers the encrypted slice certificate to a network control-plane. The network control-plane decrypts the encrypted slice certificate and determines a correspondence between expected characteristics and the slice characteristics from the decrypted slice certificate. The network control-plane authorizes the wireless user device for the wireless network slice based on the correspondence. In response to the authorization, the network control-plane transfers user context for the wireless network slice to the wireless access node and a network user-plane. The wireless access node exchanges user data between the wireless user device and the network user-plane per the user context. The network user-plane exchanges the user data between the wireless access node and a data system per the user context.Type: ApplicationFiled: March 9, 2022Publication date: September 14, 2023Inventors: Marouane Balmakhtar, Lyle Walter Paczkowski
-
Publication number: 20230292125Abstract: A method by a first core network (CN) node of a core network of a wireless communication system for authenticating a user equipment (UE) to the CN. The method includes receiving, from a second CN node, a first authentication request to authenticate the UE to the CN, and determining that the UE should be authenticated by an external authentication entity that is external to the wireless communication system. The first CN node transmits a second authentication request toward the external authentication entity, and receives a first authentication response verifying authenticity of the UE. The method further includes obtaining a key for securing communications with the UE based on the authentication response, and transmitting a second authentication response to the second CN node identifying the UE and including the key for securing communications with the UE.Type: ApplicationFiled: August 10, 2021Publication date: September 14, 2023Inventors: Noamen BEN HENDA, Vesa LEHTOVIRTA, Henrik NORMANN, David CASTELLANOS ZAMORA
-
Publication number: 20230292126Abstract: A method at an electronic device, the method including initiating authentication with a network through a network element; providing a configuration request, the configuration request including an attribute set for the electronic device; and receiving a configuration response, the configuration response including a certificate or credential for future authentication with the network.Type: ApplicationFiled: May 18, 2023Publication date: September 14, 2023Inventors: Michael Peter MONTEMURRO, James Randolph Winter LEPP, Stephen McCANN
-
Publication number: 20230292127Abstract: Systems and methods for providing privacy-preserving mobile connectivity services to a mobile device. In some aspects, the system, based on receiving a request for an authentication token from a mobile device, generates the authentication token for transmission to the mobile device. The authentication token is decoupled from the mobile device requesting the authentication token such that the authentication token cannot be used to identify the mobile device. The system, based on receiving a request for connectivity to a mobile network operator and the authentication token from the mobile device, determines whether the authentication token is valid. The system, based on determining that the authentication token is valid, obtains, from the mobile network operator, an access code for initiating connectivity for the mobile device to the mobile network operator and transmits the access code to the mobile device.Type: ApplicationFiled: March 10, 2023Publication date: September 14, 2023Inventors: Barath Raghavan, Paul Schmitt
-
Publication number: 20230292128Abstract: The present disclosure relates to: a communication technique that merges IoT technology with a 5G communication system for supporting higher data transmission rates than 4G systems; and a system therefor The present disclosure may be applied to intelligent services (for example, smart homes, smart buildings, smart cities, smart cars or connected cars, healthcare, digital education, retail business, security and safety-related services, etc.) on the basis of 5G communication technology and IoT-related technology. Disclosed is a terminal or a base station which executes an integrity protection function or an integrity verification function in a next-generation mobile communication system.Type: ApplicationFiled: July 22, 2021Publication date: September 14, 2023Inventors: Donggun KIM, Soenghun KIM
-
Publication number: 20230292129Abstract: Provided are an apparatus and method for performing remote attestation by taking into account mobility. The method includes obtaining, by each node constituting a network, a remote attestation result value by performing self-remote attestation, obtaining, by each of the nodes, remote attestation result values from the other nodes by broadcasting the obtained remote attestation result value to at least one neighboring node, and monitoring, by each of the nodes, remote attestation of each of the nodes on the basis of the obtained remote attestation result values of the nodes.Type: ApplicationFiled: March 7, 2023Publication date: September 14, 2023Inventors: Kyeong Tae KIM, Young Ho KIM, Jeong Nyeo KIM, Seon Gyoung SOHN, Yun Kyung LEE, Jae Deok LIM
-
Publication number: 20230292130Abstract: Apparatuses, methods, and systems are disclosed for associating the start of an encrypted data flow with an application. One apparatus includes a memory storing instructions executable by a processor to cause the apparatus to authenticate an encrypted traffic detection function (“ETDF”) of the remote unit and to provide the remote unit with a list of application identifiers for which encrypted traffic detection information is to be provided, in response to successfully authenticating the ETDF of the remote unit. The instructions are executable by the processor to cause the apparatus to generate detection information for each application in the list of application identifiers and to send the list of application identifiers and the detection information for each application in the list of application identifiers to a network function in the mobile communication network.Type: ApplicationFiled: May 10, 2023Publication date: September 14, 2023Inventors: Apostolis Salkintzis, Dimitrios Karampatsis
-
Publication number: 20230292131Abstract: Techniques for preventing rogue network functions in a communication network are provided. For example, a method comprises obtaining information identifying one or more network entities suspected of malicious activity operating within the communication network, causing a re-authorization of the one or more network entities suspected of malicious activity, and in response to a re-authorization failure of at least one of the one or more network entities suspected of malicious activity, causing one or more remedial actions to occur within the communication network to prevent the at least one network entity that failed re-authorization from accessing other network entities in the communication network.Type: ApplicationFiled: July 14, 2021Publication date: September 14, 2023Inventors: Saurabh KHARE, Narasimha Rao PULIPATI, Suresh NAIR
-
Publication number: 20230292132Abstract: Systems and methods of assessing a plausibility of a ranging measurement are provided. In some embodiments, a method of assessing a plausibility of a ranging measurement includes: obtaining the ranging measurement from a remote device; obtaining one or more measurements associated with the ranging measurement; and based on the one or more measurements associated with the ranging measurement, determining the plausibility of the ranging measurement. The embodiments disclosed herein determine the reliability of the measured range and thus enforce the security level of Ultra-WideBand (UWB) transactions to be secured. Some embodiments are based on existing and standardized metrics. Some embodiments include a capability to auto-assess whether it is reliable to estimate the plausibility of the transaction range. In some embodiments, the computations needed are relatively simple and can be performed by relatively simple devices.Type: ApplicationFiled: March 9, 2022Publication date: September 14, 2023Inventor: Eric Perraud
-
Publication number: 20230292133Abstract: An authorization system includes a controller of an external computing device communicatively connected to an unmanned aerial vehicle (UAV). The controller obtains a mission kit that includes software for controlling a piece of equipment configured to be assembled on the UAV. The controller receives a license that is associated with a user and determines, based on the license, whether the piece of equipment is authorized for operation on the UAV as controlled by the user. Responsive to determining that the piece of equipment is authorized, the controller initiates transmission of at least some of the software of the mission kit to the UAV for installation by the UAV to allow the user to operate the piece of equipment.Type: ApplicationFiled: May 10, 2022Publication date: September 14, 2023Applicant: THE BOEING COMPANYInventors: Darcy Lynn Davidson, Jr., Matthew Jacob Bartow, David B. Rathbun
-
Publication number: 20230292134Abstract: Examples described herein provide channel assignments for ranging between network devices in a network during beacon intervals. Examples described herein may assign a plurality of channels to a plurality of network devices based on a plurality of channel assignment permutations, and initiate, during beacon intervals, ranging measurements between the plurality of network devices on the plurality of channels based on each of the channel assignment permutations to generate ranging results. Examples described herein may determine whether total ranging measurements are performed for a threshold percentage of available links between the plurality of network devices on the plurality of channels, wherein the total ranging measurements include the ranging measurements based on each of the channel assignment permutations.Type: ApplicationFiled: March 10, 2022Publication date: September 14, 2023Inventors: Sachin Ganu, Vikram Raghu, Omar El Ferkouss
-
Publication number: 20230292135Abstract: The present disclosure describes systems, apparatuses, methods, and computer-readable media for multi-channel software-defined radio (SDR) audio transceivers, multi-user audio systems using the same, and methods of using the same. SDR audio transceivers can comprise an antenna and/or radio transmitter. SDR audio transceivers can be configured for multi-channel audio transmission. The multi-channel audio transmission can include wideband channels or channels allocated across a wideband of spectrum. The multi-channel audio transmission can include narrowband channels or channels allocated to a relatively narrower band of spectrum.Type: ApplicationFiled: March 1, 2023Publication date: September 14, 2023Inventors: Alex Stezskal, Michael J. Goodson, Robert Mamola