Patent classifications
H04W12/08
Apparatus and method for providing interworking of network slices in wireless communication system
A method of selecting, by a control entity, a network slice is provided. The method includes receiving a create session request message from a Serving Gateway (S-GW) in response to a Packet Data Network (PDN) connectivity request message transmitted by a terminal, transmitting, to a storage entity, a request message for subscriber information including identification information of the terminal, receiving, from the storage entity, subscription data of the terminal corresponding to the identification information of the terminal, selecting at least one network slice based on the subscription data of the terminal and slice information supportable by the control entity, and transmitting a create session response message including information of the selected at least one network slice, wherein the subscription data of the terminal includes information about a subscribed network slice of the terminal and information regarding whether the subscribed network slice of the terminal is supported in an Evolved Packet Core (EPC).
Information processing apparatus, information processing system, information processing method, and non-transitory storage medium
An information processing apparatus including a control unit configured to perform obtaining result data indicating a result of locking and unlocking performed by a locking and unlocking device that performs locking and unlocking based on authentication information obtained from a portable terminal carried by a user, and generating, based on the result data, proposal data including a proposal for a service to be provided to the user.
Integrated secure device manager systems and methods for cyber-physical vehicles
Systems and methods are described for a cyber-physical vehicle management system generated by an Integrated Secure Device Manager (ISDM) Authority configured to manage licensing and approval of Cyber-Physical Vehicle (CPV)s, a public/private key pair and a unique ID for the Authority, create a self-signed Authority token signed by the private key, send the Authority token to a plurality of ISDM Node device configured to verify Module device authenticity and in communication with the Authority, store, by each Node, the Authority token, and mark, by each Node, the Authority token as trusted.
Integrated secure device manager systems and methods for cyber-physical vehicles
Systems and methods are described for a cyber-physical vehicle management system generated by an Integrated Secure Device Manager (ISDM) Authority configured to manage licensing and approval of Cyber-Physical Vehicle (CPV)s, a public/private key pair and a unique ID for the Authority, create a self-signed Authority token signed by the private key, send the Authority token to a plurality of ISDM Node device configured to verify Module device authenticity and in communication with the Authority, store, by each Node, the Authority token, and mark, by each Node, the Authority token as trusted.
Wireless network association and authentication system
A wireless network association and authentication system includes an access point that is coupled to an authentication server via a first wireless network. The access point receives, from a first user device that associates with the access point, a first request for access to a second wireless network provided by the access point that is coupled to a wide area network through the first wireless network. The first request includes first authentication information. The access point provides the first request that includes the first authentication information to the authentication server via the first wireless network and receives a first authentication response from the authentication server via the first wireless network. In response to the first authentication response indicating that the first user device is authenticated, the access point provides the first user device access to the second wireless network.
Location-based asset usage control
A lighting device includes a light source configured to emit a light and a sensor configured to receive identification information from an asset tag of a physical asset. The lighting device further includes a processor configured to send the identification information received from the asset tag and location information of the lighting device to a control device. The processor is further configured to receive a usage control message from the control device and transmit the usage control message, where the usage control message controls whether the physical asset is used at a location indicated by the location information.
Location-based asset usage control
A lighting device includes a light source configured to emit a light and a sensor configured to receive identification information from an asset tag of a physical asset. The lighting device further includes a processor configured to send the identification information received from the asset tag and location information of the lighting device to a control device. The processor is further configured to receive a usage control message from the control device and transmit the usage control message, where the usage control message controls whether the physical asset is used at a location indicated by the location information.
Prestaging, gesture-based, access control system
A prestaging, gesture-based, access control system includes a local access assembly, a mobile device, a storage medium, and a processor. The assembly includes a controller to effect actuation between access and no-access states. The mobile device is carried by a user, and includes a detection system configured to detect a prestaging event inherently performed by the user toward an intent to gain access and followed by the detection of a primary intentional gesture specifically performed by the user toward the intent to gain access. The storage medium and the processor are configured to receive prestaging event information and primary intentional gesture information from the detection system, and execute an application to determine the performance of the prestaging event from the prestaging event information, then determine the performance of the primary intentional gesture from the primary intentional gesture information if the prestaging event is determined to have occurred.
Multi-factor autonomous sim lock
Aspects of the subject disclosure may include, for example, initializing a secure timer in a wireless device, determining whether a subscriber identification module (SIM) card installed in the wireless device comprises a carrier identity that matches a carrier identity stored in the machine-readable medium, establishing a network connection with a trusted server, starting the secure timer if the SIM card and network connection are satisfactory, periodically checking the network connection and SIM card until expiry of the secure timer, penalizing the secure timer responsive to a failure of the network connection or SIM card check, and responsive to expiry of the secure timer, unlocking a SIM lock. Other embodiments are disclosed.
Landing page redirect with synchronized mini-servers
Techniques for redirecting a client device from a server to a mini-server are disclosed herein. Initially, the client device establishes a connection with the server. The server provides a landing page to the client device, where the landing page is programmed to include an element that, when selected, redirects the client device away from its connection with the server. In response to a selection of the element, the client device establishes a connection with the mini-server. The mini-server is part of a first local area network (LAN), and, as a result of switching networks, the client device is now a part of a second LAN. The two LANs are connected to one another via a network bridge. The mini-server is able to receive input from the client device and synchronize that input across other mini-servers in the first LAN in order to redundantly store the input.