摘要:
A device is disclosed that may send at least one beacon to at least one device. The device may identify at least one handshake response received from the at least one device. The device may send a first multiband aggregation request to the at least one device, the multiband aggregation request including a received signal strength indication (RSSI) threshold. The device may identify a multiband aggregation response received from the at least one device, the multiband response including at least one RSSI value. The device may send association and security information associated with at least one second device to at least one third device. The device may send a second multiband aggregation request to the at least one third device. The device may send a data plane transition message to the at least one third device, the data plane transition message including a data plane transition trigger.
摘要:
Apparatuses, methods, and computer readable media for secure discovery and connection to internet of things devices in a wireless local-area network are disclosed. An apparatus of a station comprising processing circuitry is disclosed. The processing circuitry may be configured to: encode a first packet to indicate to an access point to start discovery of Internet of Things (IoT) devices, and decode a second packet from the access point. The second packet may include identifications of IoT devices unauthenticated with the access point. The processing circuitry may be configured to receive a selection from an application of the station of one of the one or more identifications of the IoT devices, and encode a third packet including the identification of the IoT device and an indication that the access point is to request establishment of a secure session with the IoT device.
摘要:
Generally discussed herein are systems, apparatuses, and methods that can provide a key authentication and identity verification in a D2D communication regime. A method can include providing a first public key of a first D2D device to a second D2D device and receiving a second public key of the second D2D device, providing a connection request packet to the second D2D device including a first attested key and a third public key, the first attested key including the first public key signed using a private key of a public key attestation service (PAS), receiving a connection accept packet from the second D2D device including a second attested public key, and a fourth public key, the second attested public key including the second public key signed using the private key of the PAS, and verifying the identity of the second D2D device using the received keys.
摘要:
Techniques for monitoring information technology (IT) assets using mobile devices are described herein. The mobile device is configured to wirelessly communicate with the IT asset using a near field communications (NFC) standard used to communicate over short distances. The IT asset is configured to include a monitoring device that is operable in a low power mode as well as in a normal power mode to monitor security related parameters. An alarm is generated in response to detecting a breach in security of the IT asset and the mobile device is notified of the alarm. A user may use the mobile device to send an encrypted message to the IT asset and instruct it to operate in a lockout mode, thereby protecting the digital assets accessible via the IT asset from unauthorized use.
摘要:
Some demonstrative embodiments include a one-touch input interface. For example, a one-touch input interface may include a hybrid Body-Area-Network (BAN) Near-Field-Communication (NFC) module to receive NFC information from a NFC device via a body of a user; and a fingerprint sensor to sense a fingerprint of the user, wherein the hybrid BAN NFC module and the fingerprint sensor are to receive the NFC information and to sense the fingerprint during a touch of the one-touch interface by the user.
摘要:
Illustrative embodiments of systems and methods providing remote management over a wireless wide-area network (WWAN) using short messages are disclosed. In one embodiment, a computing device may include an in-band processor, a wireless transceiver configured for communications over a WWAN, and an out-of-band (OOB) processor capable of communicating over the WWAN using the wireless transceiver irrespective of an operational state of the in-band processor. The OOB processor may be configured to receive a short message via the wireless transceiver, determine whether the short message originated from a trusted remote computing device, and execute at least one operation indicated by the short message in response to determining that the short message originated from a trusted remote computing device.
摘要:
Techniques for monitoring information technology (IT) assets using mobile devices are described herein. The mobile device is configured to wirelessly communicate with the IT asset using a near field communications (NFC) standard used to communicate over short distances. The IT asset is configured to include a monitoring device that is operable in a low power mode as well as in a normal power mode to monitor security related parameters. An alarm is generated in response to detecting a breach in security of the IT asset and the mobile device is notified of the alarm. A user may use the mobile device to send an encrypted message to the IT asset and instruct it to operate in a lockout mode, thereby protecting the digital assets accessible via the IT asset from unauthorized use.
摘要:
A method and device for remote management over a wireless wide-area network includes receiving a short message over a wireless wide-area network (WWAN) using an out-of-band (OOB) processor of a computing device. The OOB processor is capable of communicating over the WWAN irrespective of an operational state of an in-band processor of the computing device. The computing device executes at least one operation with the OOB processor in response to receiving the short message.
摘要:
A method, apparatus and system which enable a mobile node to request dynamic allocation of a home address and to maintain that home address when roaming between a home subnet and a foreign subnet. According to one embodiment, the mobile node may acquire a home address from its home agent by using a Network Access Identifier (“NAI”) extension in a registration request. The mobile node may send out this registration request when it first starts up, regardless of whether it is on its home subnet or a foreign subnet. Additionally, the mobile node may set a bit in the registration request to inform the home agent that it is on its home network. If the bit is not set, the home agent may deduce that the mobile node is on a foreign network. In either instance, the mobile node may continue to use its originally acquired home address.
摘要:
Embodiments of apparatus and methods for signaling for resource allocation and scheduling in 5G-NR integrated access and backhaul are generally described herein. In some embodiments, User Equipment configured for reporting a channel quality indicator (CQI) index in a channel state information (CSI) reference resource assumes a physical resource block (PRB) bundling size of two PRBs to derive the CQI index.