Patent classifications
H04W12/00
WEARABLE IDENTITY DEVICE FOR FINGERPRINT BOUND ACCESS TO A CLOUD SERVICE
A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The service may be provided by a mobile device, in the cloud, or elsewhere.
Network access tokens for accessories
A controller device within a home network (or any suitable network) can be configured to manage network access tokens for various accessory devices within the home network. These network access tokens can be used by the accessory devices to access the home network without needing the network owner's network password. The network access tokens can be revocable and/or for a limited time. The controller device can generate the network access tokens, and can provide them to the accessory devices (or other user devices) as well as to an access device on the home network. Once the access device is provisioned with the accessory device's network access token, the router can control whether the accessory device is to be granted access to the home network and for how long.
Authentication technique to counter subscriber identity module swapping fraud attack
Authentication processes to counter subscriber identity module swapping fraud attacks is disclosed. A method can comprise receiving location data representative of a tower device of a group of tower devices; receiving duration data representing a time period during which the mobile device has been traversing through a transmission region monitored by the tower device; as a function of the identification data, the location data, and the duration data, formulating a challenge query for the mobile device to answer; and sending the challenge query to the tower device.
Apparatus and methods for data collection, analysis and service modification based on online activity
Methods and apparatus for evaluating collected data relating to online activity, and modification of services within a service provider network. In one embodiment, a service provider collects data relating to the online activity of users of third-party services and correlates the data with subscribers of the service provider to generate useful products and analytics (e.g., classifications, behavioral models, etc.) containing information relating to the subscribers' online activity. The generated products may be used to determine whether and how to modify services provided to individual subscribers, exported for use by third parties, or for other purposes.
Apparatuses, methods and systems for implementing a trusted subscription management platform
Apparatuses, methods, and computer readable storage media are provided for implementing a trusted subscription management platform. An example server device is configured to transmit, to a trusted UI client of a mobile station, information regarding a set of virtual SIM cards associated with the mobile station, and receive, from the trusted UI client of the mobile station, a request to provision a particular virtual SIM card. The server device is further configured to initiate, by an SM-SR module and via a trusted baseband client of the mobile device, a secure proxy channel between the server device and a profile manager that hosts the particular virtual SIM card, and transmit, via the secure proxy channel and to the profile manager, an instruction regarding the particular virtual SIM card. Corresponding methods and computer readable storage media are provided.
Method and apparatus for transmitting group message to user equipment(UE)
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data rates beyond a 4.sup.th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A method and apparatus of a wireless network are disclosed. The method includes transmitting a first request message to request allocation of a multimedia broadcast multicast service (MBMS) group identifier from a service capability server/application server (SCS/AS) to a service capability exposure function (SCEF), the first request message including an external group identifier and an SCS/AS identifier, and receiving a first response message including the MBMS group identifier from the SCEF to the SCS/AS.
Method and apparatus for transmitting group message to user equipment(UE)
The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data rates beyond a 4.sup.th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A method and apparatus of a wireless network are disclosed. The method includes transmitting a first request message to request allocation of a multimedia broadcast multicast service (MBMS) group identifier from a service capability server/application server (SCS/AS) to a service capability exposure function (SCEF), the first request message including an external group identifier and an SCS/AS identifier, and receiving a first response message including the MBMS group identifier from the SCEF to the SCS/AS.
Asset management system utilizing a mobile application
An asset management system, comprising: a remote storage device coupled to a controller collectively configured to selectively retain an asset and selectively release the asset to an authorized user; and a mobile device configured to execute a mobile application in communication with one or more of the remote storage device and the coupled controller via one or more networks, wherein the mobile application is operable for directing operation of the one or more of the remote storage device and the coupled controller. The mobile device comprises a QR scanner operable for scanning a QR code and subsequently authorizing the authorized user. The mobile device also comprises a barcode scanner operable for scanning a barcode associated with the asset or a related asset.
Asset management system utilizing a mobile application
An asset management system, comprising: a remote storage device coupled to a controller collectively configured to selectively retain an asset and selectively release the asset to an authorized user; and a mobile device configured to execute a mobile application in communication with one or more of the remote storage device and the coupled controller via one or more networks, wherein the mobile application is operable for directing operation of the one or more of the remote storage device and the coupled controller. The mobile device comprises a QR scanner operable for scanning a QR code and subsequently authorizing the authorized user. The mobile device also comprises a barcode scanner operable for scanning a barcode associated with the asset or a related asset.
Detecting and preventing denial of service attacks due to fraudulent BSS color collision events
A management entity obtains from a first wireless access point a Basic Service Set (BSS) color collision event detected by the first wireless access point. The first wireless access point uses a first BSS color. A color collision event occurs when the first wireless access point receives from a device in a BSS of a different physical wireless access point a frame or PHY Protocol Data Unit (PPDU) that includes the first BSS color. The management entity obtains from the first wireless access point an indication whether the color collision event has been detected for longer than a predetermined duration. When the color collision event has been detected for longer than the predetermined duration, the management computes a probability of the color collision event. The management entity determines whether the color collision event is malicious or benign, and determines whether to maintain the first BSS color.