H04W12/00

Method and apparatus for providing network information

Aspects of the subject disclosure may include, for example, a method for processing an advertising request message, including, receiving an advertising request message from a mobile device, determining if an advertising exchange server associated with the advertising request is permitted to receive enhanced information associated with the mobile device if a service provider is permitted to provide location information associated with the mobile device responsive to determining that the advertising exchange server associated with the advertising request is permitted to receive the enhanced information, responsive to determining that the service provider is permitted to provide location information, adding location information associated with the mobile device to a header of the advertising request message, and transmitting the advertising request message to the advertising exchange server. Other embodiments are disclosed.

Trust management mechanisms

Systems, methods, and computer-readable media are provided for managing mutual and transitive trust relationships between resources, such as Fog/Edge nodes, autonomous devices (e.g., IoT devices), and/or analog/biological resources to provide collaborative, trusted communication over a network for service delivery. Disclosed embodiments include a subject resource configured to assign an observed resource to a trust zone based on situational and contextual information. The situational information may indicate a vector of the observed resource with respect to the subject resource. The contextual information may be based in part on whether a relationship exists between the subject resource and the observed resource. The subject resource is configured to determine a trust level of the observed resource based on the determined trust zone. Other embodiments are disclosed and/or claimed.

Secure wearable wireless personal server device
11510064 · 2022-11-22 · ·

This invention presents a non-volatile data storage apparatus that is securely worn by a user like a bracelet that stores the users sensitive information and a wirelessly coupled separate display and input device functioning as the sole or main display and input device functioning together like a single personal mobile device, wherein the non-volatile data storage apparatus authenticates the separate display and input device that it doesn't risk the security or privacy of the sensitive information transmitted to it by the non-volatile data storage apparatus.

Information processing device and non-transitory computer readable medium
11510262 · 2022-11-22 · ·

An information processing device includes a controller that controls display of a list of linkage functions executable by combining devices permitted to be used on a terminal device used by at least one user and display of candidates for a use request target device extracted from the devices on the terminal device. In response to candidates for the devices being selected and permitted to be used, the controller controls display of information of a linkage function executable by using the candidates selected and permitted to be used on the terminal device. In response to an authentication to a second device being successful within a predetermined time from a time point at which an authentication to a first device being successful, the controller controls display of information of a linkage function which are executable by using the first device and the second device on the terminal device.

EDGE-BASED ENTERPRISE NETWORK SECURITY APPLIANCE AND SYSTEM
20230054201 · 2023-02-23 ·

An enterprise-grade network security system is described herein. An enterprise-grade network security system may ensure that a consumer-managed network conforms with security standards for a company. In this manner, potential cyber threats may be prevented from infecting centralized company resources. An enterprise-grade network security system may include hardware, software, applications, and a strategic intelligence platform utilizing machine learning and artificial intelligence to identify potential security risks.

Hierarchical temporal memory for access control

A computer implemented method for access control for a restricted resource in a computer system, the method including receiving a first set of records for the computer system, each record detailing an occurrence in the computer system during a training time period when the resource is accessed in an approved manner; generating a sparse distributed representation of the set of records to form a training set for a hierarchical temporal memory (HTM); training the HTM based on the training set in order that the trained HTM provides a model of the operation of the computer system during the training time period; receiving a second set of records for the computer system, each record detailing an occurrence in the computer system during an operating time period for the computer system in use by a consumer of the resource; generating a sparse distributed representation of the second set of records to form an input set for the trained HTM; executing the trained HTM based on the input set to determine a degree of recognition of the records of the input set; and responsive to a determination that a degree of recognition of one or more records of the input set is below a threshold degree, identifying the operation of the computer system by the consumer as unauthorized.

Hierarchical temporal memory for access control

A computer implemented method for access control for a restricted resource in a computer system, the method including receiving a first set of records for the computer system, each record detailing an occurrence in the computer system during a training time period when the resource is accessed in an approved manner; generating a sparse distributed representation of the set of records to form a training set for a hierarchical temporal memory (HTM); training the HTM based on the training set in order that the trained HTM provides a model of the operation of the computer system during the training time period; receiving a second set of records for the computer system, each record detailing an occurrence in the computer system during an operating time period for the computer system in use by a consumer of the resource; generating a sparse distributed representation of the second set of records to form an input set for the trained HTM; executing the trained HTM based on the input set to determine a degree of recognition of the records of the input set; and responsive to a determination that a degree of recognition of one or more records of the input set is below a threshold degree, identifying the operation of the computer system by the consumer as unauthorized.

Network key recovery, network key recovery management, network key provision, terminal, server and access point implementing same
11589221 · 2023-02-21 · ·

A method for recovering a network key of an access point to a network, implemented by a terminal. The network key allows the terminal to be associated with the access point upon a first connection of the terminal to the access point. The network key recovery method includes: receiving, by the terminal, a network key provided by the access point on a server following a request, by the terminal to the server, for the network key of the access point, the request including an identifier of the access point and having been relayed by the server to the access point associated with the identifier of the access point in the request. Thus, as the access point does not transmit the network key directly to the terminal, but to a server on which the terminal will recover it, this limits intrusions into the network linked to the vulnerability of the Wi-Fi network.

Network key recovery, network key recovery management, network key provision, terminal, server and access point implementing same
11589221 · 2023-02-21 · ·

A method for recovering a network key of an access point to a network, implemented by a terminal. The network key allows the terminal to be associated with the access point upon a first connection of the terminal to the access point. The network key recovery method includes: receiving, by the terminal, a network key provided by the access point on a server following a request, by the terminal to the server, for the network key of the access point, the request including an identifier of the access point and having been relayed by the server to the access point associated with the identifier of the access point in the request. Thus, as the access point does not transmit the network key directly to the terminal, but to a server on which the terminal will recover it, this limits intrusions into the network linked to the vulnerability of the Wi-Fi network.

Security techniques for 5G and next generation radio access networks

Malicious attacks by certain devices against a radio access network (RAN) can be detected and mitigated, while allowing communication of priority messages. A security management component (SMC) can determine whether a malicious attack against the RAN is occurring based on a defined baseline that indicates whether a malicious attack is occurring. The defined baseline is determined based on respective characteristics associated with respective devices that are determined based on analysis of information relating to the devices. In response to determining there is a malicious attack, SMC determines whether to block connections of devices to the RAN based on respective priority levels associated with respective messages being communicated by the devices. SMC blocks connections of devices communicating messages associated with priority levels that do not satisfy a defined threshold priority level, while managing communication connections to allow messages satisfying the defined threshold priority level to be communicated via the RAN.