Patent classifications
H04W12/02
USING A PSEUDONYM FOR ACCESS AUTHENTICATION OVER NON-3GPP ACCESS
Apparatuses, methods, and systems are disclosed for using a pseudonym for access authentication over non-3GPP access. One apparatus includes a processor and a transceiver that communicates with a mobile communication network using a 3GPP access network and a non-3GPP access network. The processor sends a registration message to a first network function in the mobile communication network via the 3GPP access network, the first authentication message comprising a first indicator and a SUCI for the apparatus, wherein the first indicator comprises an indication that the apparatus has the capability for access authentication for non-3GPP access in an EPS. The processor receives a first identity pseudonym for the apparatus in response to the registration message comprising the first indicator and performs access authentication via a non-3GPP access network using the first identify pseudonym.
METHOD AND SYSTEM FOR PROVIDING PRIVACY PROTECTION IN PREPARATION FOR A PHONE CALL BETWEEN A VEHICLE OCCUPANT AND A REMOTE CONVERSATION PARTNER
A method for providing privacy protection in preparation for a phone call between a vehicle occupant of a vehicle and a remote conversation partner is provided. The method includes detecting, by an occupant detection system of the vehicle, additional listeners inside the vehicle. The method further includes receiving a call request with a telecommunication system in the vehicle for a phone call between the vehicle occupant and the remote conversation partner, the phone call being an outgoing call or an incoming call. The method further includes sending a notification to the remote conversation partner with the telecommunication system prior to establishment of the requested phone call informing the remote conversation partner about the presence of detected additional listeners.
METHOD AND SYSTEM FOR PROVIDING PRIVACY PROTECTION IN PREPARATION FOR A PHONE CALL BETWEEN A VEHICLE OCCUPANT AND A REMOTE CONVERSATION PARTNER
A method for providing privacy protection in preparation for a phone call between a vehicle occupant of a vehicle and a remote conversation partner is provided. The method includes detecting, by an occupant detection system of the vehicle, additional listeners inside the vehicle. The method further includes receiving a call request with a telecommunication system in the vehicle for a phone call between the vehicle occupant and the remote conversation partner, the phone call being an outgoing call or an incoming call. The method further includes sending a notification to the remote conversation partner with the telecommunication system prior to establishment of the requested phone call informing the remote conversation partner about the presence of detected additional listeners.
NETWORK ACCESS TOKENS FOR ACCESSORIES
A wireless access device can be configured to determine a list of accessory groups corresponding to accessories connected to a network managed by the wireless access device. The wireless access device may also be configured to identify at least one firmware update that corresponds to at least one accessory group of the list of accessory groups and request all firmware updates that correspond to the at least one accessory group. The wireless access device can also be configured to receive one or more firmware updates that corresponds to at least one of the accessories of the at least one accessory group for which a respective firmware update is available and transmit at least one firmware update of the received one or more firmware updates to at least one corresponding accessory of the at least one accessory group.
Methods for sharing private video streams with first responders under facility administrator control
A method enables video surveillance service subscribers to share image streams with individual first responder agencies in the event of emergency. A customer administrator selects permissions on each camera via privileged web-browser or mobile device. Permissions enable selection by static meta data such as type, audio, location, motion, recognition, spectrum, and epoch. Setting ranges of time controls access to video streams of present and past epochs. Under control by a customer administrator, a virtual machine dedicated to each responding agency instantiates a video server. A camera is shared by a customer administrator's selection of permissions on each camera via privileged web-browser or mobile device. Video streams of present and past epochs are controlled by ranges of time. A notification is customized for each responding agency and each event by dynamically generating a link to a secure webserver which records geo-location or network identifiers for validation.
Methods for sharing private video streams with first responders under facility administrator control
A method enables video surveillance service subscribers to share image streams with individual first responder agencies in the event of emergency. A customer administrator selects permissions on each camera via privileged web-browser or mobile device. Permissions enable selection by static meta data such as type, audio, location, motion, recognition, spectrum, and epoch. Setting ranges of time controls access to video streams of present and past epochs. Under control by a customer administrator, a virtual machine dedicated to each responding agency instantiates a video server. A camera is shared by a customer administrator's selection of permissions on each camera via privileged web-browser or mobile device. Video streams of present and past epochs are controlled by ranges of time. A notification is customized for each responding agency and each event by dynamically generating a link to a secure webserver which records geo-location or network identifiers for validation.
UNAUTHORIZED TRACKING DEVICE DETECTION AND PREVENTION
Unauthorized tracking devices, including those that change their identification information periodically, are detected to protect an individual's privacy. A mobile device of a user detects a first advertisement signal from an unknown wireless device, the first advertisement signal containing information representative of the unknown device. Multiple advertisement signals may be received as the mobile device moves a distance greater than a broadcast range away from the location where the first signal was detected. Responsive to detecting a second advertisement signal containing the same identity information after the mobile device has moved at least the distance greater than the broadcast range away from the location where the first signal was detected, the system generates an interface on the mobile device. The generated interface indicates to a user of the mobile device the presence of an unknown device.
UNAUTHORIZED TRACKING DEVICE DETECTION AND PREVENTION
Unauthorized tracking devices, including those that change their identification information periodically, are detected to protect an individual's privacy. A mobile device of a user detects a first advertisement signal from an unknown wireless device, the first advertisement signal containing information representative of the unknown device. Multiple advertisement signals may be received as the mobile device moves a distance greater than a broadcast range away from the location where the first signal was detected. Responsive to detecting a second advertisement signal containing the same identity information after the mobile device has moved at least the distance greater than the broadcast range away from the location where the first signal was detected, the system generates an interface on the mobile device. The generated interface indicates to a user of the mobile device the presence of an unknown device.
Method and apparatus for erasing security-relevant information in a device
Provided is a method for erasing security-relevant information in a device, having the method steps of: ascertaining at least one movement parameter of the device over time, monitoring the ascertained movement parameters over time on the basis of at least one prescribed movement pattern, and triggering an erase process for the security-relevant information if the ascertained movement parameter over time is consistent with the at least one prescribed movement pattern. An apparatus and a computer program product for carrying out the method to ensure that security-relevant data of the device are erased reliably and completely even in the event of an accident or another unforeseen event is also provided.
Method and apparatus for erasing security-relevant information in a device
Provided is a method for erasing security-relevant information in a device, having the method steps of: ascertaining at least one movement parameter of the device over time, monitoring the ascertained movement parameters over time on the basis of at least one prescribed movement pattern, and triggering an erase process for the security-relevant information if the ascertained movement parameter over time is consistent with the at least one prescribed movement pattern. An apparatus and a computer program product for carrying out the method to ensure that security-relevant data of the device are erased reliably and completely even in the event of an accident or another unforeseen event is also provided.