Patent classifications
H04W12/06
Method for Authentic Data Transmission Between Control Devices of a Vehicle, Arrangement with Control Devices, Computer Program, and Vehicle
A method is disclosed for authentic data transmission between control devices of a vehicle in which messages which are sent from a first control device to a receiver control device and are provided with a first cryptographic key for authentication, and messages that are sent from a second control device to the receiver control device are provided with a second cryptographic key for authentication. First status information provided with a third cryptographic key is sent from a monitoring module of the first control device to the receiver control device and second status information provided with the second cryptographic key is sent from the second control device to the receiver control device. The first status information and second status information are received by the receiver control device. The received first and second status information is evaluated to detect a manipulation of the first control device.
SECURE REMOTE DATA SUBMISSION FOR IVR SYSTEMS
Apparatus and methods for enhancing security of an authentication process of a caller that initiated a call in an Interactive Voice Response (“IVR”) system are provided. The methods may include routing the call through the IVR system to a headset. After the routing, the methods may include retrieving data associated with the caller. In response to the retrieved data meeting one or more predetermined conditions, a graphical user interface of an agent computer paired to the headset may display a plurality of validation information for validating the caller. Selection by the agent of validation information may trigger methods for transmitting a request to the caller, via a caller mobile phone, to input the validation information selected by the agent. The methods may additionally include authenticating the caller based at least in part on the information input into the mobile phone.
APPARATUS AND METHOD FOR UPDATING UE PARAMETERS BASED ON CONTROL PLANE
A unified data management function (UDM) in a communication system including: a processor, a memory, and a communication device, wherein the processor executes a program stored in the memory to perform: determining an update of a UE parameter of a terminal to update the UE parameter and notifying the updated UE parameter to an AMF connected to the terminal by invoking a service operation for an SDM notification is provided.
SYSTEMS AND METHODS FOR DEVICE-ANONYMOUS PERFORMANCE MONITORING IN A WIRELESS NETWORK
An application, executed by a User Equipment (“UE”), may receive an identifier, which may be used to monitor Key Performance Indicators (“KPIs”) associated with the UE. Such KPIs may be monitored in conjunction with execution of the application, such as at times that the application sends and/or receives traffic. The KPIs may be associated with sensor data, resources, and/or other features or functionality of the UE. The UE may obtain an identifier associated with the application and/or the UE from a KPI monitoring system of some embodiments, may obtain user consent to monitor and/or report KPIs associated with the application, and may provide such KPIs to the KPI monitoring system in conjunction with the identifier. The KPI monitoring system may generate aggregated KPI information, associated with the application, based on the KPIs received from the UE and/or KPIs received from one or more other sources.
SYSTEMS AND METHODS FOR DEVICE-ANONYMOUS PERFORMANCE MONITORING IN A WIRELESS NETWORK
An application, executed by a User Equipment (“UE”), may receive an identifier, which may be used to monitor Key Performance Indicators (“KPIs”) associated with the UE. Such KPIs may be monitored in conjunction with execution of the application, such as at times that the application sends and/or receives traffic. The KPIs may be associated with sensor data, resources, and/or other features or functionality of the UE. The UE may obtain an identifier associated with the application and/or the UE from a KPI monitoring system of some embodiments, may obtain user consent to monitor and/or report KPIs associated with the application, and may provide such KPIs to the KPI monitoring system in conjunction with the identifier. The KPI monitoring system may generate aggregated KPI information, associated with the application, based on the KPIs received from the UE and/or KPIs received from one or more other sources.
Mobile Legal Counsel System and Method
An on-demand mobile lawyer method includes receiving a live consultation request from a user, automatically receiving a live-stream of video images of the user and surroundings and storing the video images, automatically searching a plurality of records associated with a plurality of lawyers stored in a remote database, automatically identifying at least one lawyer licensed in a jurisdiction that corresponds to a current location of the user, automatically transmitting at least one notification to the identified at least one lawyer, live-streaming captured video images of the user for viewing by the identified at least one lawyer, automatically receiving and storing live-streaming video images of the identified at least one lawyer in the remote database, and automatically transmitting the live-streaming video images of the identified at least one lawyer to be displayed on a display screen viewable by the user.
SELECTING COMMUNICATION SCHEMES BASED ON MACHINE LEARNING MODEL PREDICTIONS
In some implementations, a prediction and monitoring system may processing, using a machine learning model, account data associated with an account that is associated with a user of a user device to identify a series of recurring events associated with the user device. The prediction and monitoring system may generate, using the machine learning model, a predicted transaction date and a predicted transaction amount that are both associated with the series of recurring events. The prediction and monitoring system may select, based on additional account data associated with the account and at least one of the predicted transaction date or the predicted transaction amount, a particular communication scheme, of a plurality of communication schemes, for communicating with the user. The prediction and monitoring system may transmit at least one message according to the particular communication scheme to facilitate authentication of the user.
SELECTING COMMUNICATION SCHEMES BASED ON MACHINE LEARNING MODEL PREDICTIONS
In some implementations, a prediction and monitoring system may processing, using a machine learning model, account data associated with an account that is associated with a user of a user device to identify a series of recurring events associated with the user device. The prediction and monitoring system may generate, using the machine learning model, a predicted transaction date and a predicted transaction amount that are both associated with the series of recurring events. The prediction and monitoring system may select, based on additional account data associated with the account and at least one of the predicted transaction date or the predicted transaction amount, a particular communication scheme, of a plurality of communication schemes, for communicating with the user. The prediction and monitoring system may transmit at least one message according to the particular communication scheme to facilitate authentication of the user.
Terminal verification method, and AP device, terminal and system
Disclosed are a terminal verification method, an AP device, a terminal and a system, wherein the AP device is an encrypted AP device. The method comprises: receiving a connection request sent by a first terminal, wherein the connection request comprises identification information of the first terminal; querying an authorization list according to the identification information of the first terminal, wherein the authorization list includes identification information of terminals located within a preset password-free range; and returning an authorization response to the first terminal when the authorization list includes the identification information of the first terminal, wherein the authorization response is used for instructing the first terminal to establish a network connection with the AP device. The AP device does not need to verify a first terminal located within a password-free range, thereby reducing the number of first terminals that require identity verification within a WLAN coverage range, reducing the resource consumption of the identity verification for the AP device, and enabling the use of a WLAN to be more convenient.
Terminal verification method, and AP device, terminal and system
Disclosed are a terminal verification method, an AP device, a terminal and a system, wherein the AP device is an encrypted AP device. The method comprises: receiving a connection request sent by a first terminal, wherein the connection request comprises identification information of the first terminal; querying an authorization list according to the identification information of the first terminal, wherein the authorization list includes identification information of terminals located within a preset password-free range; and returning an authorization response to the first terminal when the authorization list includes the identification information of the first terminal, wherein the authorization response is used for instructing the first terminal to establish a network connection with the AP device. The AP device does not need to verify a first terminal located within a password-free range, thereby reducing the number of first terminals that require identity verification within a WLAN coverage range, reducing the resource consumption of the identity verification for the AP device, and enabling the use of a WLAN to be more convenient.