Patent classifications
H04W12/00
PERSONAL EMULATING DEVICE FOR EMULATING GLOBAL PHONE COMMUNICATION AS DOMESTIC MOBILE COMMUNICATION
A personal emulating device for emulating global phone communication as domestic mobile communication comprises a Universal Subscriber Identity Module (USIM) authentication unit, an information confirmation unit, an authentication processing unit, and a linking unit. The USIM authentication unit includes: a USIM interface unit which interfaces with a USIM of a designated standard; an antenna unit which transmits and receives radio frequency signals of a designated mobile communication standard to and from a base station in a mobile communication network corresponding to the USIM interfaced to the USIM interface unit; and a radio unit which performs a signal processing operation for transmitting and receiving the radio frequency signals of the designated mobile communication standard to and from the base station in the mobile communication network corresponding to the USIM interfaced to the USIM interface unit.
Multi-services gateway device at user premises
An application gateway including application service programming positioned at a user premises can provide voice controlled and managed services to a user and one or more endpoint devices associated with the application gateway. The application gateway can be controlled remotely by the application service provider through a service management center and configured to execute an application service provided from the application service provider. The application gateway can execute the application service at the user premises upon voice command by a user and independent of application services executing on the application service provider's network. An application service logic manager can communicate with an application service enforcement manager to verify that the request conforms with the policy and usage rules associated with the application service in order to authorize execution of the application service on the application gateway, either directly or through endpoint devices.
Method and apparatus for remote provisioning of protection policies in an edge node based on signaling between edge nodes
A method, apparatus and computer program product may be provided for signaling-based remote provisioning and updating of protection policy information in a SEPP of a visited network. A method may include obtaining, at a home network node (hSEPP), protection policy information from a local repository in a home network or via configuration. The hSEPP is a network node at a boundary of the home netowork, and the home network is a public land mobile network (hPLMN). The method includes distributing, via a signaling interface, the protection policy information to a visited network node (vSEPP) within a visited network (vPLMN). The vSEPP is a network node at a boundary of a second network. The protection policy information includes information regarding protection of signaling messages addressed for network functions (NFs) hosted in the hPLMN and is configured for enabling the vSEPP to selectively protect outgoing messages to hSEPP in the home network.
Network slice-based security in mobile networks
Techniques for providing network slice-based security in mobile networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for network slice-based security in mobile networks in accordance with some embodiments includes monitoring network traffic on a service provider network at a security platform to identify a new session, wherein the service provider network includes a 5G network or a converged 5G network; extracting network slice information for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the network slice information.
Vehicle and control method thereof
A personal mobility sharing system includes: a personal mobility, a server, an owner terminal and a member terminal connected through a network, and the server is configured to register a device information of the personal mobility, receive a sharing setting information from the owner terminal, set a sharing mode of the personal mobility based on the sharing setting information, receive an authentication request from the member terminal and transmit an unlock signal to the personal mobility when the authentication request includes pre-registered authentication information.
Key-derivation verification in telecommunications network
A telecommunications network includes a serving network and a home network. In some examples the serving network receives, from the home network, identity data associated with a network terminal. The serving network determines a tied key using a tying key derivation function (TKDF) based on the identity data, then prepares an authentication request based on the tied key and sends the request to the terminal. In some examples, the home network receives the identity data from the access network and determines a tied key using a TKDF. The home network then determines a confirmation message based on the first tied key. In some examples, the serving network receives the identity data from the home network, and receives a network-slice selector associated with the network terminal. The serving network determines a tied key using a TKDF based on the identity data and the network-slice selector.
METHOD AND TERMINAL FOR PROCESSING SECURITY POLICY FOR V2X
A method for processing a security policy of a device may include a step for receiving, from another device, a first message including first information about a security policy of the other device. The first message may include a direct communication request message or a link modification request message. The method may further include the steps of: determining whether to accept or reject the first message on the basis of both the first information about the security policy of the other device and second information about the security policy of the device; and sending a second message on the basis of the determination.
SHARE BASED AUGMENTED REALITY CONTENT SERVICE SYSTEM
Methods and systems are directed to a content services platform. The content services platform may include a processor and a memory storing instructions that, when executed by the processor, configure the content services platform to perform a method. The method may include receiving a request to initiate a shared session from a first client, the request including a first client identifier. Based on the received request, a session identifier may be provided to the first client associated with the first client identifier. A request from a second client may be received and may be associated with the session identifier. Thus, when message data from the first client is received, the message data may be added to a queue associated with the session identifier such that the message data may be provided from the queue to the second client based on the session identifier.
Multi-factor autonomous sim lock
Aspects of the subject disclosure may include, for example, initializing a secure timer in a wireless device, determining whether a subscriber identification module (SIM) card installed in the wireless device comprises a carrier identity that matches a carrier identity stored in the machine-readable medium, establishing a network connection with a trusted server, starting the secure timer if the SIM card and network connection are satisfactory, periodically checking the network connection and SIM card until expiry of the secure timer, penalizing the secure timer responsive to a failure of the network connection or SIM card check, and responsive to expiry of the secure timer, unlocking a SIM lock. Other embodiments are disclosed.
SYSTEM AND METHOD FOR PROVIDING SECURE IDENTIFICATION SOLUTIONS
The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader.