H04W12/08

SYSTEM AND METHOD FOR DIGITAL COMMUNICATION BETWEEN COMPUTING DEVICES
20180014241 · 2018-01-11 ·

A wireless communication device, comprising radio frequency transceivers which transmit outbound messages to targeted receivers, and receive the inbound messages addressed to the respective transceiver; each having a processor which controls the transceiver to establish communication sessions according to a protocol, and processes targeting and address information. The transceiver communicates with a telephone device having a telephone address book containing information which defines the targets and address for a telephone network and perhaps other networks. The address book entries are human editable through a human machine user interface. The address book entries are intended for centrally controlled switch networks having hierarchically formatted address information, but since these are at least quasi-unique, they are used as address labels in an unswitched peer-to-peer network formed of the transceivers. This permits a common address scheme across the peer-to-peer network and switched network of the telephone device.

METHOD FOR SUPPORTING UE ACCESS CONTROL
20180014235 · 2018-01-11 ·

The present disclosure provides a method for supporting UE access control. A base station is informed by a ProSe Function via a MME or informed by the MIME of information indicating whether a UE is authorized for a D2D service. The base station performs an access control to the UE according to the information indicating whether the UE is authorized for the D2D service. The present disclosure further provides a method in which a source base station informs a target base station of the information indicating whether the UE is authorized for a D2D service. The target base station performs an access control according to the information.

ELECTRONIC TEST DEVICE DATA COMMUNICATION
20180014148 · 2018-01-11 ·

Electronic test devices and methods include data transfer capabilities. In one implementation, an assay device includes wireless communication capabilities to send assay result decisions and/or values to a separate processing and display device such as a smartphone. In another implementation, light sources are modulated both for performing an assay and encoding and transmitting a result of an assay.

System and Method of Generating and Using Bilaterally Generated Variable Instant Passwords
20180013757 · 2018-01-11 ·

Implementations of a system and method of generating and using bilaterally generated variable instant passwords are disclosed. The system is used to secure electronic transactions (e.g., an auction in which one or more bidders are unknown to the auctioneer). In this system an Internet Service Provider (ISP), on request from a USER (e.g., a bidder), facilitates an authentication process with a SERVICE PROVIDER (e.g., an auctioneer). The SERVICE PROVIDER may send a sub-folder, containing a USER name, a temporary sub variable character set, and a CALL, to the USER through the ISP. The password used to access the sub-folder is transmitted directly to the USER by the SERVICE PROVIDER. The USER gets authenticated to the SERVICE PROVIDER by using the USER name, the temporary sub variable character set, and the CALL retrieved from the sub-folder. After USER's authentication, further transactions (e.g., bids) are performed using a password for each transaction.

System and Method of Generating and Using Bilaterally Generated Variable Instant Passwords
20180013757 · 2018-01-11 ·

Implementations of a system and method of generating and using bilaterally generated variable instant passwords are disclosed. The system is used to secure electronic transactions (e.g., an auction in which one or more bidders are unknown to the auctioneer). In this system an Internet Service Provider (ISP), on request from a USER (e.g., a bidder), facilitates an authentication process with a SERVICE PROVIDER (e.g., an auctioneer). The SERVICE PROVIDER may send a sub-folder, containing a USER name, a temporary sub variable character set, and a CALL, to the USER through the ISP. The password used to access the sub-folder is transmitted directly to the USER by the SERVICE PROVIDER. The USER gets authenticated to the SERVICE PROVIDER by using the USER name, the temporary sub variable character set, and the CALL retrieved from the sub-folder. After USER's authentication, further transactions (e.g., bids) are performed using a password for each transaction.

MOBILE DEVICE TO PROVIDE ENHANCED SECURITY BASED UPON CONTEXTUAL SENSOR INPUTS
20180014195 · 2018-01-11 ·

Disclosed is a mobile device to provide enhanced security based upon contextual sensor inputs. The mobile device may include: a biometric sensor; a contextual sensor; and a processor. The processor may be configured to: determine an authentication score based upon a biometric input received from the biometric sensor; modulate the authentication score based upon a contextual sensor input from the contextual sensor related to an event; and determine if the modulated authentication score falls below a predetermined threshold. If the authentication score falls below the predetermined threshold, the processor may command that a secondary authentication be performed.

SYSTEM AND METHOD FOR FACILITATING USER ACCESS TO VEHICLES BASED ON BIOMETRIC INFORMATION

Systems and methods are provided for authorizing a user to access an access-controlled environment. The system includes a system server platform that communicates with mobile devices (e.g., smartphones) and on-board vehicle computing devices accessed by users. The embodiments enable a series of operations whereby a user accessing a vehicle is prompted to biometrically authenticate using the user's smartphone or on-board vehicle computer. In addition, the system can further authorize the user and electronically facilitate access to the vehicle as well as perform other authorized operations relating to the use of the vehicle. In addition the vehicle access system integrates with various computing devices and computer-based services accessible to the user. The systems and methods also facilitate active monitoring of the vehicle occupants and environmental conditions using optical sensors and the like so as to enhance security, convenience and safety of the occupants during use of the vehicle.

METHODS OF SUPPORTING LOCATION AND EMERGENCY CALLS FOR AN OVER-THE-TOP SERVICE PROVIDER

Methods and apparatuses for supporting location and emergency calls for an over-the-top (OTT) service provider are disclosed. A UE may send a request for an emergency call to an OTT service provider and may include in the request mobile network operator (MNO) data for a serving MNO for the UE. The OTT service provider may forward the emergency call request to an Internet Protocol (IP) Multimedia Subsystem (IMS). The IMS may determine routing information for the emergency call and either return the routing information to the OTT service provider to enable the OTT service provider to route the emergency call to a public safety answering point (PSAP) or may route the emergency call itself to the PSAP. The call request routed by the IMS or by the OTT service provider may include a reference identifier that may enable the PSAP to obtain a location for the UE from the IMS.

APPARATUS AND METHOD FOR ENHANCING PERSONAL INFORMATION DATA SECURITY

The present disclosure relates to a communication technique for converging a 5G communication system for supporting a higher data rate beyond a 4G system with an IoT technology, and a system therefor. The present disclosure can be applied to intelligent services on the basis of a 5G communication technology and an IoT-related technology (for example, smart home, smart building, smart city, smart car or connected car, healthcare, digital education, retail, security and safety-related service, and the like). The present invention provides a method for enhancing data security, comprising: when a request message including information related to a first privacy level is received from a user device, authenticating the user device; when the user device is an authenticated device as a result of the authentication, verifying the information related to the first privacy level; and when the verification of the information related to the first privacy level is completed, transmitting, to the user device, an image processed on the basis of the first privacy level among images processed on the basis of a plurality of privacy levels.

APPARATUS AND METHOD FOR ENHANCING PERSONAL INFORMATION DATA SECURITY

The present disclosure relates to a communication technique for converging a 5G communication system for supporting a higher data rate beyond a 4G system with an IoT technology, and a system therefor. The present disclosure can be applied to intelligent services on the basis of a 5G communication technology and an IoT-related technology (for example, smart home, smart building, smart city, smart car or connected car, healthcare, digital education, retail, security and safety-related service, and the like). The present invention provides a method for enhancing data security, comprising: when a request message including information related to a first privacy level is received from a user device, authenticating the user device; when the user device is an authenticated device as a result of the authentication, verifying the information related to the first privacy level; and when the verification of the information related to the first privacy level is completed, transmitting, to the user device, an image processed on the basis of the first privacy level among images processed on the basis of a plurality of privacy levels.