H04W12/06

METHOD AND SYSTEM FOR FACILITATING TERMINAL IDENTIFIERS
20180004852 · 2018-01-04 · ·

Embodiments of the present application disclose a method for providing a terminal identifier to a terminal. During operation, a security server receives a registration information set from the terminal, in which the registration information set includes multiple pieces of equipment information from the terminal. The security server then generates a terminal identifier based on the multiple pieces of equipment information in the registration information set. The security server then returns the terminal identifier to the terminal.

COMMUNICATION APPARATUS, CONTROL METHOD FOR COMMUNICATION APPARATUS, AND STORAGE MEDIUM
20180004929 · 2018-01-04 ·

A communication apparatus includes a first execution unit, a second execution unit, and a selecting unit. The first execution unit performs a first process for setting a wireless parameter, based on information obtained from a captured image. The setting of a wireless parameter is performed between the communication apparatus and another communication apparatus that operates as an access point and that is different from the communication apparatus. The second execution unit performs, based on information obtained from a captured image, a second process for setting a wireless parameter to another communication apparatus that operates as a station and that is different from the communication apparatus. The wireless parameter is one for performing wireless communication with an access point. The selecting unit selects whether the first process or the second process is to be performed, in a case where information is obtained from a first captured image.

COMMUNICATION APPARATUS, CONTROL METHOD FOR COMMUNICATION APPARATUS, AND STORAGE MEDIUM
20180004929 · 2018-01-04 ·

A communication apparatus includes a first execution unit, a second execution unit, and a selecting unit. The first execution unit performs a first process for setting a wireless parameter, based on information obtained from a captured image. The setting of a wireless parameter is performed between the communication apparatus and another communication apparatus that operates as an access point and that is different from the communication apparatus. The second execution unit performs, based on information obtained from a captured image, a second process for setting a wireless parameter to another communication apparatus that operates as a station and that is different from the communication apparatus. The wireless parameter is one for performing wireless communication with an access point. The selecting unit selects whether the first process or the second process is to be performed, in a case where information is obtained from a first captured image.

USING MULTIPLE CREDENTIALS FOR ACCESS AND TRAFFIC DIFFERENTIATION
20180007057 · 2018-01-04 ·

The disclosure relates in some aspects to establishing connectivity with a network using a first set of credentials and determining whether additional connectivity needs to be established (e.g., using a second set of credentials) to communicate data. The disclosure relates in some aspects to the use of multiple credentials for access and service connectivity. For example, traffic generated by a device may be authorized based on a different set of credentials than the set of credentials used to access the network (e.g., to connect to an LTE network for a PDN connection). In this way, traffic belonging to a specific service or application can be charged and policed based on service specific needs. The disclosure thus relates in some aspects to the use of access credentials and service credentials. These different types of credentials can be used to enable traffic differentiation and policing based on the credentials in use.

USING MULTIPLE CREDENTIALS FOR ACCESS AND TRAFFIC DIFFERENTIATION
20180007057 · 2018-01-04 ·

The disclosure relates in some aspects to establishing connectivity with a network using a first set of credentials and determining whether additional connectivity needs to be established (e.g., using a second set of credentials) to communicate data. The disclosure relates in some aspects to the use of multiple credentials for access and service connectivity. For example, traffic generated by a device may be authorized based on a different set of credentials than the set of credentials used to access the network (e.g., to connect to an LTE network for a PDN connection). In this way, traffic belonging to a specific service or application can be charged and policed based on service specific needs. The disclosure thus relates in some aspects to the use of access credentials and service credentials. These different types of credentials can be used to enable traffic differentiation and policing based on the credentials in use.

TOKEN AND CRYPTOGRAM USING TRANSACTION SPECIFIC INFORMATION
20180006821 · 2018-01-04 ·

Systems and methods for token processing are disclosed. An access device can provide access device data to a mobile communication device. The communication device generates a token request including the access device data and communication device data and sends the token request to a server computer. The server computer returns a token and a token cryptogram to the mobile communication device. The token and the cryptogram may be used in a transaction.

TOKEN AND CRYPTOGRAM USING TRANSACTION SPECIFIC INFORMATION
20180006821 · 2018-01-04 ·

Systems and methods for token processing are disclosed. An access device can provide access device data to a mobile communication device. The communication device generates a token request including the access device data and communication device data and sends the token request to a server computer. The server computer returns a token and a token cryptogram to the mobile communication device. The token and the cryptogram may be used in a transaction.

WIRELESS ACCESS AUTHENTICATION
20180007551 · 2018-01-04 ·

Examples relate to a method and a device for wireless access authentication. The method is applied to an intelligent gateway which is previously associated with account information of a user. The intelligent gateway may receive an access authentication packet comprising an authentication identification indicating a terminal device; the intelligent gateway may construct an identity verification packet comprising an authentication identification indicating the terminal device and an association account identification indicating an account registered on the intelligent gateway; the intelligent gateway may send the identity verification packet to a cloud server; the intelligent gateway may permit a terminal device corresponding to authentication identification carried in a verification success packet returned by the cloud server to pass the access authentication.

Security for Wireless Broadcasts
20180007555 · 2018-01-04 · ·

Methods and systems are provided for concealing identifying data that may be used to identify a beacon or device in broadcasts unless an observer device is able to directly or indirectly, via an authorized resolver device, translate an encrypted broadcast into the identifiable information. The wireless security scheme disclosed herein also pertains to resolving the concealed data messages to obtain the identifiable information.

Multi-Factor Authentication to Access Services
20180007060 · 2018-01-04 ·

A technology is provided for using a multi-factor authentication process to access services in a computing service environment. One or more policies can be defined for allowing access to one or more services and/or resources associated with a service provider environment according to an authenticated identity. A device, detected by a voice-capturing endpoint within a defined geographical location, may be authenticated according to a unique identification (ID). Voice data received from the voice-capturing endpoint can be authenticated. The authenticated identity can be established according to the authenticated device and the authenticated voice data. A command, received via a voice command from the voice-capturing endpoint, may be issued with the authenticated identity to access the one or more services and/or resources associated with the service provider environment according to the plurality of policies.