Abstract:
A method for obtaining a secure connection between a first server and a client. The method may comprise establishing a secure communication session between a second server and the client, wherein the second server is trusted by the first server, and the second server is configured to authenticate the client. The client may receive a client token, wherein the client token contains data associated with the first server, the second server, the client, and a digital signature. Then, the client may request secure communication access to the first server, wherein the request includes transferring the client token to the first server. Finally, the client may receive a grant of secure communication access to the first server based on authentication of the client by the first server, wherein the authentication is based on the client token validating the client and the digital signature validating the client token.
Abstract:
A method for obtaining a secure connection between a first server and a client. The method may comprise establishing a secure communication session between a second server and the client, wherein the second server is trusted by the first server, and the second server is configured to authenticate the client. The client may receive a client token, wherein the client token contains data associated with the first server, the second server, the client, and a digital signature. Then, the client may request secure communication access to the first server, wherein the request includes transferring the client token to the first server. Finally, the client may receive a grant of secure communication access to the first server based on authentication of the client by the first server, wherein the authentication is based on the client token validating the client and the digital signature validating the client token.
Abstract:
Certain aspects of the present disclosure relate to wireless communications. According to certain aspects, a method that may be performed by an access point (AP) includes outputting, for transmission to an access point (AP), a request to associate with the AP, wherein the request is encrypted with a first set of one or more keys; obtaining, from the AP, a response to the request; decrypting the response, based on the first set of keys, to obtain a second set of one or more keys; and using the second set of keys for secure data exchange with the AP.
Abstract:
Systems and methods for protecting digital assets associated with a computing device are described herein. An example of a method according to the disclosure includes assigning at least one asset worth value to respective digital assets associated with a device, computing at least one device worth value using the at least one asset worth value assigned to the digital assets associated with the device, identifying at least one device worth value threshold, performing a comparison of the at least one device worth value to the at least one worth value threshold, and initiating at least one action with respect to the digital assets associated with the device based on the comparison.
Abstract:
A method for managing a plurality of imaging devices in a vehicle includes determining that a change of data security mode is indicated for frames of image data transmitted over a first data communication link, determining whether a sensor management system has sufficient processing capacity to support the change of data security mode, increasing the processing capacity of the sensor management system by modifying data security settings for at least one other data communication link when the processing capacity of the sensor management system is insufficient to support the change of data security mode, and initiating the change of data security mode when the sensor management system has sufficient processing capacity to support the change of data security mode. The change of data security mode may include a change from an application-based to a link-based data security mode or a change from the link-based to the application-based data security mode.
Abstract:
Aspects relate to changing at least one communication parameter. In some examples, the at least one communication parameter may include at least one of an association identifier (AID), a packet number (PN), a sequence number (SN), a traffic identifier (TID), a timing synchronization function (TSF) value, or a combination thereof. In some examples, a first apparatus provides an indication of a change associated with at least one of the AID, the PN, the SN, the TID, the TSF value, or a combination thereof to a second apparatus.
Abstract:
Disclosed is an apparatus and method to implement a queuing process by a position enabled mobile device to prioritize the legitimacy of initiation messages. The method may include: transmitting an emergency call; receiving at least one initiation message; and assigning the received initiation message to one of a plurality of priority queues, wherein the assignment to the priority queue is based upon at least one of an identifier of an emergency location platform or a whitelist.
Abstract:
This disclosure provides methods, devices and systems for using a pseudonym service set identifier (pSSID) for access point (AP) and station (STA) privacy. For example, a pSSID is included by a STA or AP in place of a persistent SSID for over the air communications used for various functions (such as for the STA to determine the SSID of the AP before connecting to the AP). The pSSID is generated using a hash function that is defined at both the AP and the STA. An input to the hash function includes the SSID. Other inputs may include a temporary media access control (MAC) address of the device generating the pSSID, a time value associated with a time when the pSSID is generated, or a location value associated with a position measurement of the device generating the pSSID.
Abstract:
Methods, devices, non-transitory processor-readable media of various embodiments provide for routing Misbehavior Detection Reports from vehicle-to-everything (V2X) onboard equipment to an associated entity. Various embodiments may include storing, within a Misbehavior Report Router resulting from provisioning of a certificate to a V2X onboard equipment, information that enables a Misbehavior Detection Report to be routed to the entity associated with misbehaving V2X onboard equipment, examining a Misbehavior Detection Report received from a reporting V2X onboard equipment to identify a Pseudonym Certificate Authority Misbehavior Report Router of the entity associated with misbehaving V2X onboard equipment, passing the Misbehavior Detection Report to the identified Pseudonym Certificate Authority Misbehavior Report Router, using information in the Misbehavior Detection Report with information stored in the Pseudonym Certificate Authority Misbehavior Report Router to route the Misbehavior Detection Report to the associated entity.
Abstract:
Methods and apparatuses are presented for use in a terminal to access a discovered location server. The methods may include in response to a determination that a first network does not support authenticated access from the terminal to a home location server, obtaining authenticated access to the home location server using a second network that does support authenticated access to the home location server by the terminal. In response to obtaining authorization for the discovered location server from the home location server, the terminal may access the discovered location server using the first network.