Patent classifications
H04M1/66
SYSTEM FOR AUTHENTICATING A PHONE NUMBER USING A PHONE NUMBER CERTIFICATE
An apparatus, related devices and methods, having a memory element operable to store instructions; and a processor operable to execute the instructions, such that the apparatus is configured to identify, on an electronic device, a phone number of an incoming caller device; request, via an out-of-band control channel, a digital certificate for the phone number from the incoming caller device; receive, via the out-of-band control channel, the digital certificate for the phone number from the incoming caller device; determine whether the digital certificate for the phone number is authentic; and indicate, on the electronic device, based on a determination that the digital certificate for the phone number is authentic or not authentic, whether the phone number is authentic or not authentic.
SYSTEM FOR AUTHENTICATING A PHONE NUMBER USING A PHONE NUMBER CERTIFICATE
An apparatus, related devices and methods, having a memory element operable to store instructions; and a processor operable to execute the instructions, such that the apparatus is configured to identify, on an electronic device, a phone number of an incoming caller device; request, via an out-of-band control channel, a digital certificate for the phone number from the incoming caller device; receive, via the out-of-band control channel, the digital certificate for the phone number from the incoming caller device; determine whether the digital certificate for the phone number is authentic; and indicate, on the electronic device, based on a determination that the digital certificate for the phone number is authentic or not authentic, whether the phone number is authentic or not authentic.
Method to authenticate with a mobile communication network
Apparatuses, methods, and systems are disclosed for authenticating with a mobile communication network. One apparatus includes a processor, a first transceiver that communicates with a mobile communication network via a first access network, and a second transceiver that communicates with the mobile communication network via a second access network. The processor sends a request to start authentication via the second access network and receives an extensible authentication protocol (“EAP”) request with a first expanded type via the second access network. The processor sends an EAP response via the second access network, the EAP response comprising the first expanded type, a first set of parameters, and a first message. Here, the first message is a same type of message usable to establish a connection with the mobile communication network over the first access network.
Loading security information with restricted access
An approach for providing security information to a device to enable the device to secure end-to-end data communication with an end server. The security information is downloaded to a SIM of the device in response to an authentication message issued by the device. The security information is secured within the SIM so that it can only be accessed/interpreted using a first key associated with the device. The securing is performed based on identity data, identifying the device or components thereof, contained in the authentication message.
Online service providing system and application program
When a user attempts to execute a procedure for transfer or the like from an app, user authentication is first required by a PIN code or the like. When the user authentication is successful, function limitation of an IC chip is released and a mode in which a function provided by the IC chip can be used is set. The app encrypts a procedure message describing procedure content with a private key using the function of the IC chip and creates electronic signature. The electronic signature and the procedure message are transmitted to a server of an online service via an intermediate server. The server executes a procedure of transfer or the like in accordance with the content of the procedure message.
CONTEXT-BASED PAIRING APPARATUS, AND METHOD THEREOF
A pairing apparatus according to exemplary embodiments of the present invention comprises a position measurer for measuring position changes of a first direction and a second direction; and a processor for generating a secret key using the measured position change of the first direction and the measured position change of the second direction and performing a pairing with a pairing target apparatus using the secret key.
Method and apparatus for setting profile
A method and apparatus for setting profiles are provided. The profile setting method includes receiving, from a first terminal, a profile transfer request message that requests transfer of a first profile or portion thereof from a first secure element to a second secure element; configuring a second profile using the first profile or portion thereof; and sending, to a second terminal, the configured second profile.
ELECTRONIC APPARATUS AND METHOD OF SELECTIVELY APPLYING SECURITY MODE IN MOBILE DEVICE
A method of a mobile device configured to photograph an object includes controlling a display panel to display an image, a touch panel to receive a user input, and a network interface to wirelessly communicate with an external network, unlocking the mobile device when the mobile device is in an area condition, a wireless communication condition, and a time condition, and unlocking the mobile device according to a password when the mobile device is not in the time condition.
Method for transmitting an existing subscription profile from a mobile network operator to a secure element, corresponding servers and secure element
A method for transmitting a subscription profile from an MNO to a secure element pre-provisioned with a temporary profile comprising a unique identifier, MCC and MNC, includes: —Transmitting from the MNO the unique identifier to a SM-DP; —Creating the subscription profile at the SM-DP; —Provisioning in a D-HSS server having the first MCC/MNC the unique identifier and a temporary IMSI comprising a second MCC, a second MNC; —Provisioning in the MNO the temporary IMSI and an ephemeral key; —At the first attempt of the secure element to connect to the D-HSS server, exchanging data in signaling messages for provisioning the secure element with the temporary IMSI; —At the next attempt of the secure element to connect to the MNO network with the temporary IMSI, open an APN and send from the SM-DP to the secure element the subscription profile.
Detecting fraud rings in mobile communications networks
An example method performed by a processing system obtaining a first port-in number for a first mobile device from a first mobile communications service provider, wherein the first port-in number is known to be involved in fraudulent activity, constructing a social graph of communications between the first port-in number and a plurality of other numbers associated with a plurality of other communications devices, identifying, by the processing system, a maximal subgraph of the social graph, wherein the maximal subgraph connects the first port-in number and a subset of the plurality of other numbers that includes those of the plurality of other numbers for which a usage metric is below a predefined threshold for a defined period of time prior to the first port-in number being ported into the first mobile communications service provider, and identifying, by the processing system, a potential fraud ring, based on the maximal subgraph.