KR-20260066065-A - Peripheral Internet of Things security architecture
Abstract
Systems and techniques for wireless communication are provided. For example, a process may include receiving shared credentials from a provisioning service—wherein the shared credentials are shared between a device and an application function—; generating tag information; encoding a portion of the tag information based on the shared credentials to generate encoded tag information; and broadcasting the encoded tag information.
Inventors
- 이, 수범
- 혼, 가빈 버나드
Assignees
- 퀄컴 인코포레이티드
Dates
- Publication Date
- 20260512
- Application Date
- 20240911
- Priority Date
- 20230919
Claims (20)
- As a device for wireless communication, A memory system including instructions; and The above-mentioned memory system includes a processor system coupled thereto, and the processor system, To receive shared credentials from a provisioning service—said that the shared credentials are shared between the device and the application function—; To generate tag information - the shared credential includes a token, the token is included in the tag information, and the tag information is encoded based on the public key of the issuer of the token -; To generate encoded tag information by encoding a portion of the tag information based on the shared credentials above; and A device configured to broadcast the above-mentioned encoded tag information.
- In claim 1, the device, wherein the tag information includes a tag identifier (ID) and metadata.
- A device according to paragraph 2, wherein the tag ID is encoded based on the shared credential, and the tag information further includes routing information.
- A device according to paragraph 3, wherein the tag ID is further encoded based on a freshness parameter comprising at least one of a period, a counter number, a timer, or a pseudo-random number.
- A device according to paragraph 2, wherein the tag ID is encoded based on a tag verification key, and the tag verification key is generated by the application function unit based on the shared credential and one or more configured parameters.
- In paragraph 5, the device wherein the one or more configured parameters include at least one of the network identity, frequency band, network device identity, or any combination thereof.
- In paragraph 2, the device, wherein the tag ID is encoded based on the public key of a wireless network service or the public key of a data clearing house.
- In claim 1, the device, wherein the shared credential includes the public key of the application function unit.
- In claim 1, the issuer of the token comprises at least one of a wireless network service or a data clearing house coupled to the wireless network.
- In paragraph 1, the token is a device received from the application function unit.
- As a method for wireless communications, A step of receiving shared credentials from a provisioning service - said shared credentials are shared between the device and the application function -; Step of generating tag information - the shared credential includes a token, the token is included in the tag information, and the tag information is encoded based on the public key of the issuer of the token -; A step of generating encoded tag information by encoding a portion of the tag information based on the shared credentials; and A method comprising the step of broadcasting the above-mentioned encoded tag information.
- In claim 11, the method wherein the tag information includes a tag identifier (ID) and metadata.
- A method according to claim 12, wherein the tag ID is encoded based on the shared credential, and the tag information further includes routing information.
- A method according to claim 13, wherein the tag ID is further encoded based on a freshness parameter comprising at least one of a period, a counter number, a timer, or a pseudo-random number.
- A method according to claim 12, wherein the tag ID is encoded based on a tag verification key, and the tag verification key is generated by the application function based on the shared credential and one or more configured parameters.
- A method according to claim 15, wherein the one or more configured parameters include at least one of the network identity, frequency band, network device identity, or any combination thereof.
- In paragraph 12, the method wherein the tag ID is encoded based on the public key of a wireless network service or the public key of a data clearing house.
- In claim 11, the method wherein the shared credential comprises the public key of the application function unit.
- In claim 11, the issuer of the token comprises at least one of a wireless network service or a data clearing house coupled to the wireless network.
- In paragraph 11, the method wherein the token is received from the application function unit.
Description
Peripheral Internet of Things security architecture Aspects of the present disclosure generally relate to wireless communications. For example, aspects of the present disclosure relate to a security architecture for the Internet of Things (IoT) (e.g., "tags"). Wireless communication systems are deployed to provide various telecommunication services, including telephony, video, data, messaging, and broadcasting, among other things. Wireless communication systems have been developed through various generations, including 1st generation (1G) analog wireless phone services, 2nd generation (2G) digital wireless phone services (including intermediate 2.5G and 2.75G networks), 3rd generation (3G) high-speed data, internet-enabled wireless services, 4th generation (4G) services (e.g., Long Term Evolution (LTE) or WiMAX), and 5th generation (5G) services (e.g., 5G New Radio (NR)). Many different types of wireless communication systems currently exist in use, including cellular and personal communications service (PCS) systems. Examples of disclosed cellular systems include cellular analog AMPS (Advanced Mobile Phone System) and digital cellular systems based on CDMA (code division multiple access), FDMA (frequency division multiple access), TDMA (time division multiple access), GSM (Global System for Mobile communication), etc. The following presents a simplified summary relating to one or more embodiments disclosed herein. Accordingly, the following summary should not be construed as a comprehensive overview relating to all embodiments considered, nor should it be construed as identifying key or decisive elements relating to all embodiments considered, or describing categories associated with any particular embodiment. Accordingly, the following summary is intended solely to present specific concepts relating to one or more embodiments relating to the mechanisms disclosed herein, in a simplified form preceding the detailed description provided below. Systems, methods, devices, and computer-readable media for performing wireless communication are disclosed. According to at least one exemplary example, a device for wireless communication is provided. The device includes a memory system and a processor system coupled to the memory system. The processor system is configured to receive shared credentials from a provisioning service—wherein the shared credentials are shared between the device and an application function, the shared credentials include a token, the token is included in tag information, and the tag information is encoded based on the public key of the token issuer—; to generate tag information; to generate encoded tag information by encoding a portion of the tag information based on the shared credentials; and to broadcast the encoded tag information. In another example, a device for wireless communication by an application function is provided. The device includes a memory system containing instructions and a processor system coupled to the memory system. The processor system is configured to provision a shared credential to a wireless device—wherein the shared credential is shared between the device and the wireless device, the shared credential includes a token, the token is included in tag information, and the tag information is encoded based on the public key of the token issuer—; to provide information associated with the wireless device to a service of a wireless network; to receive encoded tag information from the wireless device; and to obtain tag information from the wireless device by decoding at least a portion of the encoded tag information based on the shared credential. As another example, a device for wireless communications by service of a wireless network is provided. The device includes a memory system containing instructions and a processor system coupled to the memory system. The processor system is configured to receive information associated with a wireless device from an application function unit coupled to the device; to receive encoded tag information from the wireless device; and to verify the wireless device based on the received information associated with the wireless device and the encoded tag information. In another example, a method for wireless communications is provided. The method comprises the steps of: receiving shared credentials from a provisioning service—wherein the shared credentials are shared between a device and an application function, the shared credentials include a token, the token is included in tag information, and the tag information is encoded based on the public key of the token issuer—; generating tag information; encoding a portion of the tag information based on the shared credentials to generate encoded tag information; and broadcasting the encoded tag information. As another example, a method for wireless communication by an application function is provided. The method comprises the steps of: provisioning a shared credential to a wireless device—w