H04L2209/80

Secure streaming of real-time location data between electronic devices

Embodiments described herein provide for system and methods to enable the secure streaming of real-time location data between electronic devices. One embodiment provides for a non-transitory machine-readable medium storing instructions to perform operations comprising creating record to specify a location streaming relationship between a first device registered with a first user account and a second device registered with a second online account, the record including a secret key. The record is stored to an online datastore and shared between the first user account and the second online account. The location data stream can be encrypted using the secret key stored in the record.

Methods, systems, and devices for federated blockchain-enabled handover authentication
11582667 · 2023-02-14 · ·

Aspects of the subject disclosure may include, for example, authenticating, by a federated blockchain controller, a user equipment located within a cell coverage area of a network that includes heterogeneous cells. The federated blockchain controller can provide encryption data to the user equipment and corresponding authentication information to one or more multi-access edge computing (MEC) devices associated with the heterogeneous cells to enable secure and efficient handovers for the user equipment amongst the heterogeneous cells, without a need for additional handover reauthentication procedures. Other embodiments are disclosed.

Vehicle information communication system

A vehicle information communication system includes a center apparatus and a vehicle apparatus that includes a group of electronic control units (ECUs) and that sends vehicle configuration information including configuration information on the group of ECUs mounted in the vehicle to the center apparatus via wireless communications. The center apparatus performs a first determination of whether the vehicle configuration information received from the vehicle apparatus matches approved-configuration information registered in an approved-configuration database, and performs a second determination of whether software update data for at least one ECU of the group of ECUs mounted in the vehicle exists in an update database. When both the first and second determinations are true, the center apparatus sends the software update data for at least one ECU of the group of ECUs mounted in the vehicle to the vehicle apparatus via the wireless communications.

SECURE COMMUNICATION METHOD
20230039446 · 2023-02-09 ·

Disclosed is a method for a secure communication method having a secret key generation technique. The novelty of the proposed method stems from enhancing physical layer security (PHY) by using channel-adaptive keys, after manipulating a channel by introducing an artificial component into the channel. An adaptively designed artificial component is cascaded with the legitimate user’s channel. In an orthogonal frequency division multiplexing (OFDM) system, subcarriers corresponding to a channel gain higher than a threshold value are selected to extract the keys. Since the number of the selected subcarriers is adaptive, the length of the generated key sequences is changing adaptively as well. Thus, the channel reciprocity property in a time division duplexing (TDD) system is utilized.

MANAGEMENT ELECTRONIC DEVICE AND METHOD FOR WIRELESS COMMUNICATION, AND COMPUTER READABLE MEDIUM
20230039651 · 2023-02-09 · ·

A management electronic device includes a processing circuit configured to: obtain a spectrum in an N-th round of spectrum trading and acquire the interference received by the management electronic device when an electronic device uses the traded spectrum; receive the interference received by another electronic device as determined by another electronic device related to spectrum trading; determine competition rights parameters of the management electronic device and the other electronic device, respectively, the competition rights parameters representing the credibility of the electronic devices and the magnitude of competitiveness when competing for management rights in an N+1-th round of spectrum trading; and select a new management electronic device on the basis of at least one among the interference and the competition rights parameters, the new management electronic device having management rights in the N+1-th round of spectrum trading, instead of the management electronic device having management rights.

LOCATION VERIFICATION METHOD AND SYSTEM FOR SMART CITY, AND MOBILE COMMUNICATION DEVICE THEREFOR
20230039247 · 2023-02-09 ·

A location verification system according to an embodiment of the present disclosure includes a plurality of base stations located in respective preset areas and transmitting, to an adjacent mobile communication device, location verification information obtained by signing GPS information on the base stations with a private key. It is possible to expect an effect of re-verifying a location of a mobile communication device, such as a drone or a smart car, at a destination, when the mobile communication device has moved to the destination based on GPS information.

Integrated secure device manager systems and methods for cyber-physical vehicles

Systems and methods are described for a cyber-physical vehicle management system generated by an Integrated Secure Device Manager (ISDM) Authority configured to manage licensing and approval of Cyber-Physical Vehicle (CPV)s, a public/private key pair and a unique ID for the Authority, create a self-signed Authority token signed by the private key, send the Authority token to a plurality of ISDM Node device configured to verify Module device authenticity and in communication with the Authority, store, by each Node, the Authority token, and mark, by each Node, the Authority token as trusted.

Scalable certificate revocation truth distribution and verification using a bloom filter set and a false positive set for PKI-based IoT scenarios

A first IoT device includes a memory, a transceiver, bloom filter evaluation, false positive comparison and control modules. The memory stores: a bloom filter set including an array of bits representing entries in a certificate revocation list; and a false positive set including a list of certificate entries falsely identified as being revoked. The transceiver receives from a second IoT device a message including a certificate. The bloom filter evaluation module receives the bloom filter set from a back office station and determines whether an identifier associated with the certificate is in the bloom filter set. The false positive comparison module receives the false positive set from the back office station and determines whether the identifier is in the false positive set. The control module permits communication between the first and second IoT devices based on whether the identifier is in the bloom filter and false positive sets.

Secure communication between a contact lens and an accessory device

Described herein are systems and methods that allow for secure wireless communication between a contact lens system and an accessory device to protect sensitive data and prevent unauthorized access to confidential information. In certain embodiments, tampering attempts by potential attackers are thwarted by using a Physically Unclonable Functions (PUF) circuit that is immune to reverse engineering. In addition, sensors monitor a to-be-protected electronic device to detect tampering attempts and physical attacks to ensure the physical integrity of the communication system.

MBS Security in UE Mobility
20230037970 · 2023-02-09 ·

In response to a UE in a wireless network leaving a multicast group to which the user equipment belonged or switching between multiple access nodes belonging to the multicast group, sending by an access node a rekeying token for UE(s) in the multicast group to use to access data for the multicast group. The access node generates key(s) based at least on the rekeying token. The access node multicasts traffic to the UE(s) in the multicast group using the key(s). In response to an other UE in a wireless network leaving a multicast group to which a UE belongs or switching by the UE between multiple access nodes belonging to the multicast group, receiving, at the UE from an access node, a rekeying token to use. The UE generates key(s) based at least on the rekeying token and receives multicast traffic using the key(s).