H04W12/30

NORMALIZING AND SECURELY TRANSMITTING TELEMATICS DATA

Methods, systems, and storage media for securely transmitting information are disclosed. Exemplary implementations may: receive a user identification token from a mobile device associated with a first user; verify an identity of the first user utilizing the user identification token; provide a positive response token to the mobile device associated with the first user indicating the identity of the first user has been verified; based on providing the positive response token, receive telematics data, the user identification token, and a timestamp from the mobile device associated with the first user; normalize the received telematics data; based on privacy settings derived from the mobile device associated with the first user, receive permission, from the first user, to share the normalized telematics data; and based on receiving permission, from the first user, to share the normalized telematics data, transmitting at least a portion of the normalized telematics data to a second user.

NORMALIZING AND SECURELY TRANSMITTING TELEMATICS DATA

Methods, systems, and storage media for securely transmitting information are disclosed. Exemplary implementations may: receive a user identification token from a mobile device associated with a first user; verify an identity of the first user utilizing the user identification token; provide a positive response token to the mobile device associated with the first user indicating the identity of the first user has been verified; based on providing the positive response token, receive telematics data, the user identification token, and a timestamp from the mobile device associated with the first user; normalize the received telematics data; based on privacy settings derived from the mobile device associated with the first user, receive permission, from the first user, to share the normalized telematics data; and based on receiving permission, from the first user, to share the normalized telematics data, transmitting at least a portion of the normalized telematics data to a second user.

Device authentication system and method
11617080 · 2023-03-28 ·

There is a system for controlling access to an electronic device. This system can comprise at least one server having at least one microprocessor. There can be at least one remote device having at least one microprocessor, and at least one GPS location device, wherein the one remote device is configured to communicate a location of the at least one remote device. This remote device further comprises any one of at least one transceiver configured to communicate wirelessly, at least one biometric reader configured to read a biometric of a user and/or at least one hardware reader configured to read an identification piece. Thus, the electronic device is selectively unlocked via either an internal lock or via the server authenticating a location of the remote device, a Wifi signal of the remote device, a biometric reading of the remote device and a reading of the hardware reader of the remote device.

Device authentication system and method
11617080 · 2023-03-28 ·

There is a system for controlling access to an electronic device. This system can comprise at least one server having at least one microprocessor. There can be at least one remote device having at least one microprocessor, and at least one GPS location device, wherein the one remote device is configured to communicate a location of the at least one remote device. This remote device further comprises any one of at least one transceiver configured to communicate wirelessly, at least one biometric reader configured to read a biometric of a user and/or at least one hardware reader configured to read an identification piece. Thus, the electronic device is selectively unlocked via either an internal lock or via the server authenticating a location of the remote device, a Wifi signal of the remote device, a biometric reading of the remote device and a reading of the hardware reader of the remote device.

P25 radio that functions as a key management facility or a key fill device

A P25 radio can be configured to implement a key management facility to thereby manage keysets for and provision the keysets on other P25 radios in a communications system. The P25 radio, as a radio, can directly communicate with the other P25 radios to provision keysets in accordance with the OTAR protocol. The P25 radio may also be configured to function as a key fill device to thereby provision keysets manually on any of the other P25 radios to which it may be physically or wirelessly connected. The P25 radio may also be configured to use the keysets to communicate securely with any of the other P25 radios.

METHOD AND SYSTEM FOR UPDATING A MEDICAL DEVICE
20230092591 · 2023-03-23 ·

The present disclosure includes methods, devices and systems for establishing a connection between a medical device and a remote computing device, receiving an upgrade command at the medical device, storing a current version of persistent data and a current version of executable code in a first storage area of the medical device, transmitting at least the current version of the persistent data to the remote computing device, receiving a second format of the current version of the persistent data and an upgraded version of executable code at the medical device, storing the second format of the current version of the persistent data and the upgraded version of the executable code in a second storage area of the medical device, and executing the upgraded version of the executable code with the second format of the current version of the persistent data.

Access controller for secure transactions

A method for performing secure transactions is disclosed. The method includes: providing an access controller between a core application and a third-party application, where the access controller prevents the third-party application from unauthorized access to the core application; receiving, by the access controller, a command from the third-party application to access the core application; transmitting, by the access controller, an authorization request to a secure application storing credentials of a user; providing, by the access controller, the third-party application with access to the core application in response to the access controller receiving notification from the secure application that the command is authorized; and preventing, by the access controller, the third-party application from accessing the core application in response to the access controller receiving notification from the secure application that the command is unauthorized.

REMOTE SIM PROVISIONING

Various aspects include methods for supporting remote Subscriber Identity Module (SIM) profile provisioning that may be performed by a Lightweight Machine-to-Machine (LwM2M) server and LwM2M client computing devices, such as Internet of Things (IoT) devices. A LwM2M server may receive an indication of a SIM profile update for a LwM2M client computing device from a mobile network operator server, generating a remote SIM provisioning object for the LwM2M client computing device indicating that the SIM profile update for the LwM2M client computing device is available, and sending the remote SIM provisioning object to the LwM2M client computing device. A LwM2M computing device may receive a remote Subscriber Identity Module (SIM) provisioning object from a LwM2M server indicating that a SIM profile update for the LwM2M computing device is available, and download the SIM profile update in response to receiving the remote SIM provisioning object.

CYBERSECURITY SYSTEM FOR EDGE PROTECTION OF A WIRELESS TELECOMMUNICATIONS NETWORK
20230087670 · 2023-03-23 ·

A method performed by a system includes instantiating a vulnerability-risk-threat (VRT) service for a security edge protection proxy (SEPP) element of a 5G telecommunications network. The system intercepts and parameterizes network traffic of the SEPP element to identify network functions (NFs) or associated services that requires cybersecurity protection and selects security resources for protecting the identified NFs or associated services. The system prioritizes an NF or associated service that is most frequently used (MFU) or most recently used (MRU) and then allocates the security resources in accordance with the prioritization.

System and method for providing network support services and premises gateway support infrastructure

A service management system communicates via wide area network with gateway devices located at respective user premises. The service management system remotely manages delivery of application services, which can be voice controlled, by a gateway, e.g. by selectively activating/deactivating service logic modules in the gateway. The service management system also may selectively provide secure communications and exchange of information among gateway devices and among associated endpoint devices. An exemplary service management system includes a router connected to the network and one or more computer platforms, for implementing management functions. Examples of the functions include a connection manager for controlling system communications with the gateway devices, an authentication manager for authenticating each gateway device and controlling the connection manager and a subscription manager for managing applications services and/or features offered by the gateway devices. A service manager, controlled by the subscription manager, distributes service specific configuration data to authenticated gateway devices.