Patent classifications
H04W4/02
METHOD WHEREBY TERMINAL SELECTS PLMN IN WIRELESS COMMUNICATION SYSTEM, AND DEVICE FOR SAME
One embodiment of the present invention relates to a method whereby a terminal performs an operation related to public land mobile network (PLMN) selection related to ProSe direct communication in a wireless communication system, the method for performing an operation related to PLMN selection comprising the steps of: selecting a first PLMN; performing registration with the first PLMN; and selecting a second PLMN in case of failure to register with the first PLMN, wherein when selecting the second PLMN, the terminal treats a list that did not include the first PLMN at the time of selecting the first PLMN as if the list has included the first PLMN.
TOKEN AND CRYPTOGRAM USING TRANSACTION SPECIFIC INFORMATION
Systems and methods for token processing are disclosed. An access device can provide access device data to a mobile communication device. The communication device generates a token request including the access device data and communication device data and sends the token request to a server computer. The server computer returns a token and a token cryptogram to the mobile communication device. The token and the cryptogram may be used in a transaction.
TOKEN AND CRYPTOGRAM USING TRANSACTION SPECIFIC INFORMATION
Systems and methods for token processing are disclosed. An access device can provide access device data to a mobile communication device. The communication device generates a token request including the access device data and communication device data and sends the token request to a server computer. The server computer returns a token and a token cryptogram to the mobile communication device. The token and the cryptogram may be used in a transaction.
SYSTEMS AND METHODS FOR DETECTING AND INTERFERING WITH COMPROMISED DEVICES AND UNAUTHORIZED DEVICE RELOCATION IN A COMMUNICATION NETWORK
Systems and methods for detecting and interfering with compromised devices and unauthorized device relocation in a communication network are disclosed. The described embodiments may be deployed in a content delivery network where receivers have been compromised in a manner that renders the conditional access system (CAS) inoperative at controlling the receivers' ability to receive content. In some embodiments, alternate commands not protected by the CAS system may be used to detect hacked devices and interdict same. In some embodiments, service devices in the content delivery network may allow for detection of unauthorized device relocation.
SYSTEMS AND METHODS FOR DETECTING AND INTERFERING WITH COMPROMISED DEVICES AND UNAUTHORIZED DEVICE RELOCATION IN A COMMUNICATION NETWORK
Systems and methods for detecting and interfering with compromised devices and unauthorized device relocation in a communication network are disclosed. The described embodiments may be deployed in a content delivery network where receivers have been compromised in a manner that renders the conditional access system (CAS) inoperative at controlling the receivers' ability to receive content. In some embodiments, alternate commands not protected by the CAS system may be used to detect hacked devices and interdict same. In some embodiments, service devices in the content delivery network may allow for detection of unauthorized device relocation.
ELECTRONICALLY CONNECTED ENVIRONMENT
Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, to facilitate and/or support one or more operations and/or techniques for an electronically connected environment, such as implemented in connection with one or more computing and/or communication networks, devices, and/or protocols, for example.
Passive Entry Systems Employing Time of Flight Distance Measurements
Systems and methods employ ultra-wide band (UWB) time of flight (ToF) distance measurements for locating a portable device relative to a target. Performance and reliability of UWB ToF distance measurements for locating the portable device is improved by adjusting a communication retry strategy based on signal quality calculations. The quality of an UWB signal received by each satellite of a base station is assessed based on factors like signal strength, noise level, and ratio of first path signal power to total signal power. This data is used to direct the retry strategy to the satellites receiving the best signal quality for these satellites to conduct ToF distance measurements with the portable device and/or to add correction factors to calculated ToF distance measurements.
DETERMINING SCALE FOR RECEIVED SIGNAL STRENGTH INDICATORS AND COORDINATE INFORMATION
Examples disclosed herein relate to determining a scale associated with received signal strength indicators (RSSIs). In one example, a computing device receives access point (AP) RSSIs. The RSSIs are determined at APs. The APs are associated with coordinate information. In one example, records are maintained for AP reference pairs. Each AP RSSI can be determined at one AP with reference to another AP. In one example, the computing device determines a scale associated with each record.
SYSTEMS AND METHODS FOR RECONFIGURATION OF NODE HARDWARE IN A NETWORK OF MOVING THINGS
Communication network architectures, systems and methods for supporting a network of mobile nodes. As a non-limiting example, various aspects of this disclosure provide communication network architectures, systems, and methods for supporting dynamically re-configurable and adaptable network devices in a communication network comprising a complex array of both static and moving communication nodes (e.g., the Internet of moving things).
SECURING IDENTITIES OF CHIPSETS OF MOBILE DEVICES
A method of verifying IMEIs and chipset S/Ns of devices within a wireless communication network. The method comprises receiving a request from a device to access the wireless communication network and receiving an international mobile equipment identity (IMEI) and serial number (S/N) from the device, wherein the IMEI and S/N are included on a chipset of the device, and wherein the S/N is the S/N for the chipset. The method further comprises comparing the IMEI and S/N with a database to confirm the authenticity of the IMEI and S/N. Based upon the authenticity of the IMEI and S/N, the request is either granted or not granted for the device to access the wireless communication network.