Patent classifications
H04W12/12
Context-dependent authentication system, method and device
A method for authenticating a user using a user device connected to a communications network, the method comprising an implicit phase, wherein said implicit phase comprises performing at least one task within a workflow, said at least one task necessary to move forward within said workflow; storing information associated with said performing of at least one task; comparing said stored information with a stored user profile; and determining whether said authentication of said user is successful or unsuccessful based on said comparing.
Key distribution method, key receiving method, first key management system, and first network element
The present invention disclose a key distribution method. The method includes obtaining, by a first key management system, a shared key of a first network element, where the shared key of the first network element is generated according to a key parameter obtained after the first network element performs authentication or a root key of the first network element; obtaining a service key, where the service key is used to perform encryption and/or integrity protection on communication data in a first service between the first network element and a second network element; performing encryption and/or integrity protection on the service key by using the shared key of the first network element, to generate a first security protection parameter; and sending the first security protection parameter to the first network element. According to present invention, data can be protected against an eavesdropping attack in a sending process.
Key distribution method, key receiving method, first key management system, and first network element
The present invention disclose a key distribution method. The method includes obtaining, by a first key management system, a shared key of a first network element, where the shared key of the first network element is generated according to a key parameter obtained after the first network element performs authentication or a root key of the first network element; obtaining a service key, where the service key is used to perform encryption and/or integrity protection on communication data in a first service between the first network element and a second network element; performing encryption and/or integrity protection on the service key by using the shared key of the first network element, to generate a first security protection parameter; and sending the first security protection parameter to the first network element. According to present invention, data can be protected against an eavesdropping attack in a sending process.
Methods, systems, and computer readable media for short message delivery status report validation
Methods, systems, and computer readable media for short message delivery status report validation are disclosed. One method occurs at a first network node. The method includes receiving a short message delivery status report appearing to be associated with a short message delivery to a mobile subscriber; determining, using a data store containing information about short message delivery attempts, whether the short message delivery status report is valid or invalid, wherein the information about the short message delivery attempts indicates a validation time period for receiving a valid short message delivery status report; and performing a processing action based on the determination.
System and Method for Capturing Data Sent by a Mobile Device
Systems and methods for providing capture, archival, and analysis of data sent by mobile devices over a carrier network, with the systems and methods not requiring the installation of any additional software on the mobile devices, the systems and methods also providing for alerts to be generated based on the content of the data.
System and Method for Capturing Data Sent by a Mobile Device
Systems and methods for providing capture, archival, and analysis of data sent by mobile devices over a carrier network, with the systems and methods not requiring the installation of any additional software on the mobile devices, the systems and methods also providing for alerts to be generated based on the content of the data.
System and Method for Mitigating Risk of Frauds Related to Streaming Content Consumption
A method and system for mitigating risk of frauds related to streaming content consumption is disclosed. Users' interaction data corresponding to a plurality of users of a digital platform related to streaming content is received. A set of users from the plurality of users is determined based on the users' interaction data. The set of users is determined based on the presence of at least one of an outlier event and an anomaly in their respective user interaction data. For each user of the set of users, a user breach profile for a user is generated; a fraud event is determined by applying at least one rule on the user breach profile; at least one action is triggered in response to a determination of the fraud event; and a risk score is determined for the user based on the user breach profile to monitor user interaction data of the user.
METHOD AND SYSTEM FOR REDUCED V2X RECEIVER PROCESSING LOAD USING NETWORK BASED APPLICATION LAYER MESSAGE PROCESSING
A method at a network element for processing a first message destined for an intelligent transportation system station, the method including receiving from a sending entity, or generating, the first message at the network element; based on a source or contents of the first message, performing one of: discarding the first message; or modifying the first message to provide an indication to the intelligent transportation system station of checks the intelligent transportation system does not need to perform, thereby creating a second message; and forwarding the second message to the intelligent transportation system station.
PROCESSOR WITH NETWORK STACK DOMAIN AND SYSTEM DOMAIN USING SEPARATE MEMORY REGIONS
The disclosed technology is generally directed to network security for processors. In one example of the technology, a computing device includes: a processor, a memory, and a network interface. The computing device executes a first binary within a first region of the memory, executes a separate second binary within a second region of the memory, and prevents the second binary from accessing the first region of the memory. The first binary implements a kernel configured to control the network interface, while the separate second binary implements a network stack that is restricted to communicate only with an identified set of trusted servers.
Detecting man-in-the-middle attacks in adaptive streaming
Systems and methods for adaptively streaming video content to a wireless transmit/receive unit (WTRU) or wired transmit/receive unit may include obtaining a media presentation description that comprises a content authenticity, requesting a key for a hash-based message authentication code; receiving the key for the hash-based message authentication code, determining a determined hash for a segment of the media presentation description, requesting a reference hash for the segment from a server, receiving the reference hash for the segment from the server, and comparing the reference hash to the determined hash to determine whether the requested hash matches the determined hash.