摘要:
Various communication systems may benefit from appropriate security measures. For example, mobile networks may benefit from the flexible selection of security features. A method can include receiving an attach request. The method can also include sending a response to the request. The response can include information configured to allow selection of a control plane integrity algorithm independently of a user plane integrity algorithm.
摘要:
Methods for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message are provided. One of the methods includes placing a place marker signature record in the NDEF message. The place marker signature record is a modified signature Record Type Definition (RTD). A first set of records preceding the place marker signature record in the NDEF message are unsecured. The method also includes securing the second set of records following the place marker signature record. Another method includes placing a secured bytes field in the signature Record Type Definition (RTD). The secured byte filed indicates number of bytes of data to be secured preceding this field of the signature RTD. The method also includes securing data in records preceding this field in the signature RTD, based on the value of the secured bytes filed.
摘要:
A method of protecting WLAN Control Protocol (WLCP) message exchange between a Trusted WLAN Access Gateway (TWAG) (112) of a Trusted WLAN Access Network (TWAN) (110) and a User Equipment (UE) (101) are provided. The method comprises deriving, by an Authentication, Authorization, and Accounting, (AAA) Server (103) of an Evolved Packet Core (EPC) network which is interfaced with the TWAN, and by the UE, a Master Session Key (MSK) and an Extended MSK (EMSK), sending, from the AAA Server to a Trusted WLAN AAA Proxy (TWAP) (113) of the TWAN and an Access Point (AP) (111) of the TWAN, the MSK or a key derived from at least the MSK, and deriving, by the TWAN or by the AAA Server, and by the UE, from the MSK, the EMSK, or the key derived from at least the MSK or the EMSK, a key for protecting the WLCP message exchange. Corresponding devices, computer programs, and computer program products are further provided.
摘要:
Disclosed are systems and methods for secure control of automotive systems using mobile devices. An exemplary method comprises: connecting a vehicle, as a peripheral device, to a mobile device, which acts as a master device, via a security device of the vehicle, wherein the security device provides secure transmission of data and commands between the vehicle and the mobile device; receiving, by the mobile device, via the security device, from one or more measurement devices of the vehicle, measurement data from one or more automotive systems of the vehicle; based on the received measurement data, forming by the mobile device control commands for actuating devices of the vehicle, wherein the control commands enable and/or regulate operation of the actuating devices of the vehicle; and transmitting, by the mobile device, via the security device, the control commands to the actuating devices of the vehicle.
摘要:
A method of a beacon transmitting a beacon signal is provided. The method including, receiving, by the beacon including a processor, authentication-related information of the device from a server, broadcasting a beacon signal generated based on the authentication-related information, and when a receiver located at an arbitrary location receives the generated beacon signal, receiving beacon service information corresponding to information about the receiver from the server.
摘要:
A method and apparatus for securing location information and access control using the location information are disclosed. A wireless transmit/receive unit (WTRU) includes a location sensing entity and a subscriber identity module (SIM). The location sensing entity generates location information of the WTRU and the location information is embedded in a message in an SIM. A trusted processing module in the WTRU verifies integrity of the location information. The trusted processing module may be on the SIM. The location information may be physical location information or contextual location-related information. The trusted processing module is configured to cryptographically secure and bind the location information to the WTRU, and verify trust metrics of an external entity prior to granting an access to the location information or accepting information from the external entity. The trusted processing module may be a trusted computing group (TCG) trusted platform module (TPM) or mobile trusted module (MTM). The location information may be used for an authentication purpose or access control. The location information may be combined with time information.
摘要:
The present invention provides a method and an apparatus for interacting information between a smart terminal and a wearable device. The method includes: acquiring first control information containing behavior information of a tester; acquiring second control information containing brain wave information of the tester; comparing the first control information with the second control information to obtain a comparison result; and executing the first control information when the comparison result indicates that the first control information is consistent with the second control information. In the above-mentioned solution, a control signal containing the behavior information of the tester is compared with a control signal containing the brain wave information of the tester, and a corresponding operation can be performed only if the two control signals are consistent with each other. In this way, misoperation is avoided effectively, and an effective communication between the wearable device and the mobile terminal is ensured.
摘要:
The invention relates to a method, to an associated computer program product, to a production unit, and to an arrangement for examining a consistency between reference data of a production object and data of a digital twin of the production object, wherein two separate communication channels are used.
摘要:
Systems and methods for analyzing applications on a mobile device for risk so as to maintain the privacy of the application user are provided. In the example method, the process receives a request from a mobile device. The request includes a cryptographic representation of application information for an application residing on a mobile device. The method includes comparing the cryptographic representation to an application information database that includes cryptographic representations of applications. The method also includes automatically remediating, e.g., quarantining and retiring, the application if the application matches an application that is a known risk in the database. Exemplary embodiments provide companies with controls to prevent specific applications—which have specific behaviors and are present on mobile devices being used by employees—from being used by employees, without the company having any visibility into what particular applications are being used by the employees on the mobile device.