Medium access control security
    81.
    发明授权

    公开(公告)号:US11470473B2

    公开(公告)日:2022-10-11

    申请号:US16734009

    申请日:2020-01-03

    摘要: Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may transmit to a base station (BS), information indicating a medium access control (MAC) security capability of the UE. The UE may receive from the BS, a communication that includes an indication of a MAC security configuration for communications between the UE and the BS. The indication of the MAC security configuration may be based at least in part on the MAC security capability of the UE. Numerous other aspects are provided.

    Secure wireless communication with peripheral device

    公开(公告)号:US11470472B2

    公开(公告)日:2022-10-11

    申请号:US16428759

    申请日:2019-05-31

    摘要: Methods and systems for performing wireless communication are presented. In one example, a wireless peripheral device comprises a wireless transceiver configured to receive and transmit data over a primary channel, an optical sensor configured to receive data over an out-of-band channel, and one or more processors configured to: receive, via the wireless transceiver and over the primary channel, wireless signals including first key data from a second device; receive, via the optical sensor, optical signals including verification data from the second device; verify the first key data based on the verification data; and responsive to verifying the first key data based on the verification data, generate a digital security key based on the first key data, the digital security key used for following data transmission between the wireless peripheral device and the second device via the wireless transceiver.

    RANGE CONSTRAINED DEVICE CONFIGURATION

    公开(公告)号:US20220303128A1

    公开(公告)日:2022-09-22

    申请号:US17832369

    申请日:2022-06-03

    申请人: Intel Corporation

    摘要: Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.

    Programmable ultrasonic transceiver

    公开(公告)号:US11440050B2

    公开(公告)日:2022-09-13

    申请号:US16908240

    申请日:2020-06-22

    申请人: Invensense, Inc.

    摘要: An ultrasonic transceiver system includes a transmitter block, a receiver block, a state machine, a computer unit. The transmitter block contains circuitry configured to drive an ultrasound transducer. The receiver block contains circuitry configured to receive signals from the ultrasound transducer and convert the signals into digital data. The state machine is coupled to the transmitter and receiver blocks and contains circuitry configured to act as a controller for those blocks. The computing unit is coupled to the transmitter block, the receiver block, and the state machine and is configured to drive the transmitter block and process data received from the receiver block by executing instructions of a program. The program memory is coupled to the computing unit and is configured to store the program. The computing unit is configured to be reprogrammed with one or more additional programs stored in the program memory.

    SEPARATE IO AND CONTROL THREADS ON ONE DATAPATH POD OF A RIC

    公开(公告)号:US20220287038A1

    公开(公告)日:2022-09-08

    申请号:US17384780

    申请日:2021-07-25

    申请人: VMware, Inc.

    摘要: To provide a low latency near RT RIC, some embodiments separate the RIC's functions into several different components that operate on different machines (e.g., execute on VMs or Pods) operating on the same host computer or different host computers. Some embodiments also provide high speed interfaces between these machines. Some or all of these interfaces operate in non-blocking, lockless manner in order to ensure that critical near RT RIC operations (e.g., datapath processes) are not delayed due to multiple requests causing one or more components to stall. In addition, each of these RIC components also has an internal architecture that is designed to operate in a non-blocking manner so that no one process of a component can block the operation of another process of the component. All of these low latency features allow the near RT RIC to serve as a high speed IO between the E2 nodes and the xApps.

    Method and system for relay attack detection

    公开(公告)号:US11432155B2

    公开(公告)日:2022-08-30

    申请号:US16477852

    申请日:2017-03-15

    摘要: A method preventing relay attacks between first and second devices is disclosed. The method includes providing, by a first device, a command message, receiving a request message and providing a response message to a second device. The time period between the receipt of the command message and the transmission of the response message by the first device is compared to another time period between the time when the command message was sent and the response message was received by the second device. If those times substantially match, then the first device can have assurance that a relay attack is not occurring.

    Methods and systems for performing multi-domain network slice selection and approval

    公开(公告)号:US11419046B2

    公开(公告)日:2022-08-16

    申请号:US17047129

    申请日:2018-04-13

    摘要: Methods and systems for performing multi-domain network slice selection and approval are provided. According to one aspect, a method performed by a Network Slice Selection Function comprises: receiving, from a requesting entity, a request for a network slice for use by a client device; upon determining that the network slice selection requires approval, identifying an Authorizing Network Function (ANF) for authorizing a network slice for the client device; determining a trust status of the ANF; identifying, based on the trust status, a network interface to use when communicating with the ANF; sending a slice selection authorization request to the ANF via the identified network interface; receiving from the ANF an approval status of a network slice; determining, based on the approval status and approval conditions, an allowed network slice; and sending, to the requesting entity, information including the allowed network slice.

    System and method for out-of-band pairing of sterile device with non-sterile device

    公开(公告)号:US11382155B2

    公开(公告)日:2022-07-05

    申请号:US17023063

    申请日:2020-09-16

    发明人: Barret Daniels

    摘要: System and methods for out-of-band pairing sterile medical device with non-sterile devices without compromising sterility thereof. A system includes a sterile medical device; a non-sterile computing device; at least one near field communication (NFC) tag; and a sterile packaging enclosing the sterile medical device. In one example, a sterile percutaneous needle guidance device needs to pair and communicate with a non-sterile computer. The sterile device has an NFC tag embedded in the sterile device and an NFC tag embedded in the sterile packaging. The two NFC tags include identification information duplicate of each other. Before opening the sterile packaging either NFC tag can be scanned with the non-sterile device to initiate wireless pairing. If the sterile package is opened before pairing, the NFC tag contained in the packaging can be brought out of the sterile field and scanned with the non-sterile computer thus preserving the sterility of the sterile device.