Patent classifications
H04W12/02
Mission-critical push-to-talk
A user equipment is configured for concealment of a mission-critical push-to-talk (MCPTT) group identity in multimedia broadcast multicast services (MBMS). The UE is configured in particular to receive an indication of an MCPTT group pseudonym (7) which is a pseudonym for an MCPTT group identity (11) that identifies an MCPTT group of which the UE is a member. The UE may for example receive this indication from a group management server (GMS) or an MCPTT server. The UE in some embodiments may determine whether received control signalling (e.g., an MBMS subchannel control message) is for the MCPTT group of which the UE is a member, by determining whether the control signaling includes the MCPTT group pseudonym (7).
Secure provisioning of electronic subscriber identity module (eSIM) profiles
A method of providing an electronic subscriber identity module (eSIM) profile to a wireless communication device. The method comprises receiving an eSIM profile provisioning request by a subscription manager-data preparation+ (SM-DP+) server, wherein the provisioning request comprises an embedded UICC identifier (EID) number, a private identity code, and wireless communication service subscription information; building an eSIM profile package by the SM-DP+ server based in part on the wireless communication service subscription information, wherein the eSIM profile package comprises an eSIM profile, the EID number, and the private identity code; sending a notification of the availability of the eSIM profile by the SM-DP+ server to a subscription manager-discovery server (SM-DS server), wherein the notification comprises the EID number and the private identity code; and transmitting the eSIM profile package by the SM-DP+ server to the wireless communication device.
ENCRYPTING MAC HEADER FIELDS FOR WLAN PRIVACY ENHANCEMENT
Embodiments are disclosed for encrypting media access control (MAC) Header fields for Wireless LAN (WLAN) privacy enhancement. For example, a transceiver of a station (STA) or an access point (AP) can set a real time Media Access Control (MAC) header bit in a payload of an aggregated MAC Protocol Data Unit (A-MPDU) subframe to an actual value of a power management (PM) field of a MAC header of the A-MPDU subframe. The transceiver can encrypt the payload, set the PM field to an over the air (OTA) PM value, and transmit the A-MPDU subframe over the air. The OTA PM value can include all zeros, a predetermined value, or a randomized value The transceiver can also set static MAC header bits in the payload of the A-MPDU subframe to corresponding actual values of an aggregated MAC service data unit (A-MSDU) present field of the A-MPDU subframe.
TRUSTED SYSTEM FOR PRIVACY-PRESERVING VALIDATION OF INDIVIDUALS
Aspects of the subject disclosure may include, for example, receiving, from a computing device, a validation request for validating an individual associated with a mobile device equipped with an authentication app communicatively coupled with an authentication system, obtaining request data from a user validation system, enabling, using the request data, the computing device to communicate with the user validation system to facilitate the validation, wherein the validation involves the user validation system triggering the authentication system to provide access information to the computing device, the authentication system authenticating the individual/mobile device, the authentication system providing, to the user validation system, identification information of the individual based on the authenticating, and the user validation system determining a validation result based on data relating to the identification information. Aspects also include obtaining the validation result from the user validation system and causing the validation result to be presented. Other embodiments are disclosed.
TRUSTED SYSTEM FOR PRIVACY-PRESERVING VALIDATION OF INDIVIDUALS
Aspects of the subject disclosure may include, for example, receiving, from a computing device, a validation request for validating an individual associated with a mobile device equipped with an authentication app communicatively coupled with an authentication system, obtaining request data from a user validation system, enabling, using the request data, the computing device to communicate with the user validation system to facilitate the validation, wherein the validation involves the user validation system triggering the authentication system to provide access information to the computing device, the authentication system authenticating the individual/mobile device, the authentication system providing, to the user validation system, identification information of the individual based on the authenticating, and the user validation system determining a validation result based on data relating to the identification information. Aspects also include obtaining the validation result from the user validation system and causing the validation result to be presented. Other embodiments are disclosed.
Network embeddings model for personal identifiable information protection
Systems and methods for providing remote network security using a network embeddings model are provided. A method consistent with the present disclosure includes retrieving a corpus of network activity data associated with a first network. The network activity data may be generated from users within the first network submitting network requests for network assets to service the network requests. The method also includes creating a crafted encoded corpus by selecting a subset of the corpus of network activity data and creating a network embeddings model based on the crafted encoded corpus. Lastly, the method includes generating an alert in an event that the network security system identifies an anomaly associated with the crafted encoded corpus of network activity data.
AUGMENTED REALITY INFORMATION DISPLAY AND INTERACTION VIA NFC BASED AUTHENTICATION
Various embodiments are generally directed to improving card security by providing a user a contactless card with no sensitive card information, such as card number, card verification value, and expiration date, printed thereon, and displaying the sensitive card information relative to the card in augmented reality (AR) based on successful NFC-based user authentication. According to examples, the NFC-based user authentication may be performed by one-tapping or single tapping the contactless card to user mobile device. One or more portions of the sensitive card information may be obfuscated to further enhance card security. Moreover, the user can interact with AR elements including the sensitive card information to perform various actions.
Location service management
An application manager of a mobile device can provide a user with the ability to control whether an application can use location information provided by a location subsystem of the mobile device. The application can request a current location of the mobile device and the location subsystem can provide the location of the mobile device in accordance with a location services authorization type that is assigned to the application.
Location service management
An application manager of a mobile device can provide a user with the ability to control whether an application can use location information provided by a location subsystem of the mobile device. The application can request a current location of the mobile device and the location subsystem can provide the location of the mobile device in accordance with a location services authorization type that is assigned to the application.
Location aware cryptography
A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with the second entity. A location associated with the first entity may be identified. Furthermore, a first key may be generated based on a combination of the location associated with the first entity and a private key that corresponds to the public key. The first key may decrypt data encrypted by the second key when the location associated with the first entity corresponds to the location associated with the second entity.