H04W12/30

System and method for sending and receiving security alerts at differing locations
11576010 · 2023-02-07 · ·

A system for facilitating sending and receiving of security alerts may include a processor communicatively coupled to a memory and a network interface, the network interface communicatively coupled to a network. A fixed location manager and a roving location manager may be communicatively coupled to the network interface and the network and may be configured to: (i) receive security messages from a plurality of user mobile devices coupled with the network, (ii) create a fixed forum security message and a roving forum security message, each of which is associated with a geographic location of one of the security messages, and (iii) send the fixed forum security message and the roving forum security message to all of the plurality of user mobile devices that comprise a fixed alert area or a roving alert area associate with the geographic location.

System and method for sending and receiving security alerts at differing locations
11576010 · 2023-02-07 · ·

A system for facilitating sending and receiving of security alerts may include a processor communicatively coupled to a memory and a network interface, the network interface communicatively coupled to a network. A fixed location manager and a roving location manager may be communicatively coupled to the network interface and the network and may be configured to: (i) receive security messages from a plurality of user mobile devices coupled with the network, (ii) create a fixed forum security message and a roving forum security message, each of which is associated with a geographic location of one of the security messages, and (iii) send the fixed forum security message and the roving forum security message to all of the plurality of user mobile devices that comprise a fixed alert area or a roving alert area associate with the geographic location.

Network Slice Allocation and Network Slice Rejection

A user equipment (UE) is configured to transmit a first registration request to a network, receive a registration accept message in response to the first registration request comprising a rejected network slice and an indication of a rejection cause corresponding to the rejected network slice and transmit a second registration request to the network comprising a requested network slice, wherein the requested network slice and the rejected network slice are a same network slice.

Network Slice Allocation and Network Slice Rejection

A user equipment (UE) is configured to transmit a first registration request to a network, receive a registration accept message in response to the first registration request comprising a rejected network slice and an indication of a rejection cause corresponding to the rejected network slice and transmit a second registration request to the network comprising a requested network slice, wherein the requested network slice and the rejected network slice are a same network slice.

ACCESS CONTROL VIA A MOBILE DEVICE

Systems, devices, and methods for access control via a mobile device are described herein. One method includes receiving location information associated with a mobile device in a facility, determining that the mobile device is within a particular distance of an area of the facility based on the location information, determining whether a user of the mobile device is allowed access to the area, and allowing access to the area via a relay associated with the area responsive to a determination that the user is allowed access.

ACCESS CONTROL VIA A MOBILE DEVICE

Systems, devices, and methods for access control via a mobile device are described herein. One method includes receiving location information associated with a mobile device in a facility, determining that the mobile device is within a particular distance of an area of the facility based on the location information, determining whether a user of the mobile device is allowed access to the area, and allowing access to the area via a relay associated with the area responsive to a determination that the user is allowed access.

Updating a Subscriber Identity Module
20230030698 · 2023-02-02 ·

Updating a subscriber identity module, SIM, on a host device by deriving a pre-shared key by requesting a SIM identifier via communication module of the host device; receiving SIM identifier and deriving an agent identifier from SIM identifier; transmitting agent and SIM identifiers to SIM update server; receiving a random value from SIM update server and supplying it to the SIM to initiate SIM authentication procedure. In reply, receiving an authentication response from the SIM; and deriving pre-shared key from authentication response; transmitting an update request message to SIM update server, wherein the update request message comprises the agent identifier and is encrypted before transmission using the pre-shared key; receiving an update response message from the SIM update server which has update data and is encrypted using pre-shared key; and following decryption of update response message using derived pre-shared key, transmitting update data to communication module.

SECURE COMMUNICATION IN MOBILE DIGITAL PAGES

Secure communication in mobile digital pages is provided. The system receives an electronic document and validates the electronic document for storage in a cache server. The system receives a request for the electronic document and provides it to a viewer component on a client computing device. The viewer component loads the electronic document in an iframe. The viewer component executes a runtime component to receive, via a secure communication channel, a tag from the electronic document. The system receives the tag and selects a data value for transmission to the viewer component. The viewer components provides the data value to cause the runtime component to execute an action with the data value.

METHODS AND SYSTEMS FOR TRANSITIONING BETWEEN CLIENT-LESS AND CLIENT-BASED NETWORK CONNECTIVITY TO A SECURE ACCESS SERVICE EDGE (SASE) DOMAIN
20230100070 · 2023-03-30 · ·

Method and systems for transitioning a wireless device between client-less connectivity and client-based connectivity are disclosed. In an embodiment, a method for transitioning a wireless device between client-less connectivity and client-based connectivity involves forwarding traffic from a wireless device through a SASE domain, receiving a request for information related to a SASE gateway in the SASE domain from the wireless device, transmitting information related to the SASE gateway from the SASE domain to the wireless device in response to the request, and transitioning the wireless device between client-less connectivity to the SASE gateway and client-based connectivity to the SASE gateway.

METHOD AND SYSTEM FOR DISTRIBUTED POLICY-BASED SECURITY FOR CONNECTED DEVICES

A computer-implemented method, system, and computer program product for providing distributed policy-based security for one or more devices enabled for connectivity over a communications network are disclosed. The computer-implemented method for providing distributed policy-based security for one or more devices enabled for connectivity over a communications network includes providing a policy enforcement agent for each of one or more devices enabled for connectivity; providing policy rules to the policy enforcement agent, wherein the policy rules comprise one or more of: traffic filter policy rules, network access policy rules, power management policy rules and application management policy rules; and managing policy-based security for the one or more devices by the policy enforcement agent by applying the provided policy rules immediately or based on the provided criteria evaluated on the device.