Patent classifications
H04W12/60
SELECTING COMMUNICATION SCHEMES BASED ON MACHINE LEARNING MODEL PREDICTIONS
In some implementations, a prediction and monitoring system may processing, using a machine learning model, account data associated with an account that is associated with a user of a user device to identify a series of recurring events associated with the user device. The prediction and monitoring system may generate, using the machine learning model, a predicted transaction date and a predicted transaction amount that are both associated with the series of recurring events. The prediction and monitoring system may select, based on additional account data associated with the account and at least one of the predicted transaction date or the predicted transaction amount, a particular communication scheme, of a plurality of communication schemes, for communicating with the user. The prediction and monitoring system may transmit at least one message according to the particular communication scheme to facilitate authentication of the user.
METHODS FOR REPORTING ENCRYPTION CAPABILITY
A method according to some embodiments include reporting, by a beamformee, an encryption capability indicator to a beamformer, wherein the encryption capability indicator is indicative of a capability of the beamformee to encrypt a feedback frame. The method may also include receiving, by the beamformee from the beamformer, an announcement frame in response to the beamformer receiving an indication that the beamformee is capable of encrypting the feedback frame, and then sending, by the beamformee, an encrypted feedback frame.
METHODS FOR REPORTING ENCRYPTION CAPABILITY
A method according to some embodiments include reporting, by a beamformee, an encryption capability indicator to a beamformer, wherein the encryption capability indicator is indicative of a capability of the beamformee to encrypt a feedback frame. The method may also include receiving, by the beamformee from the beamformer, an announcement frame in response to the beamformer receiving an indication that the beamformee is capable of encrypting the feedback frame, and then sending, by the beamformee, an encrypted feedback frame.
SYSTEM FOR DETERMINING NETWORK MEMBERSHIP
Aspects described herein may allow for determining network membership to facilitate detecting fraudulent messages. A computing device may receive, from one or more terminals at a first location, a plurality of interactive messages during a pre-determined time period. Each interactive message may comprise personally identifiable information of a user. The computing device may store a first record and a second record that indicate interactive messages were received from a group of users in temporal proximity to each other at the first location and the second location respectively. The computing device may send a request to confirm users in the subset are members of a network and update a membership list based on a reply received from the user. If further messages are received from devices outside the membership list, an alert may be sent to alert the possibility of a fraudulent message.
Multi-factor autonomous sim lock
Aspects of the subject disclosure may include, for example, initializing a secure timer in a wireless device, determining whether a subscriber identification module (SIM) card installed in the wireless device comprises a carrier identity that matches a carrier identity stored in the machine-readable medium, establishing a network connection with a trusted server, starting the secure timer if the SIM card and network connection are satisfactory, periodically checking the network connection and SIM card until expiry of the secure timer, penalizing the secure timer responsive to a failure of the network connection or SIM card check, and responsive to expiry of the secure timer, unlocking a SIM lock. Other embodiments are disclosed.
Multi-link wireless communications connections
A method includes establishing a multi-link security association between a transmitter upper Media Access Control (MAC) logic entity of a transmitter and a receiver upper MAC logic entity of a receiver. The transmitter includes one or more transmitter links. The receiver includes one or more receiver links.
Signaling techniques for sensor fusion systems
This disclosure provides methods, devices and systems for a vehicle user equipment (VUE) to obtain extrinsic information about an object or location. The VUE may transmit a request for information about the object or the location to a road side unit (RSU). The RSU may receive the request and determine a set of extrinsic information for the first UE regarding the object or the location based on a set of information from one or more other UEs. The extrinsic information includes information that is not provided by the VUE. The RSU may transmit the set of extrinsic information to the VUE. The VUE may determine whether to accept a feature of the object or the location in the extrinsic information based on the set of extrinsic information and a set of intrinsic information detected by the VUE, The VUE may select an autonomous driving action based on the accepted feature.
System and method for trustworthy internet whitelists
Information is received from a first networked device for a first user and from a second networked device for a second user. The first user and the second user are verified and registered. A first set of data for the first user and a second set of data for the second user that each specify one or more network parameters per network address that communicates with each user are received from a networked collector device. Addresses are selected from each of the first set and the second set where each of the one or more network parameters are above a first activity threshold level for that parameter. A first set and a second set of first level activity addresses are produced. A whitelist is generated for the first user from an intersection of the first set of first level activity addresses and the second set of first level activity addresses.
DEVICE FOR WIRELESS COMMUNICATION WITH OTHER DEVICES
A device (110) arranged for wireless communication (130) according to a communication protocol has a processor (112) to execute a connection sequence according to a discovery protocol. The connection sequence comprises determining a current cluster identity and a current discovery window timing used by the device. Next, at least one other device (120,120′) within wireless range is detected, while further determining a detected cluster identity and a detected discovery window timing of the detected other device. Then it is detected whether the detected device is operating in a different cluster than the device by comparing the current cluster identity with the detected cluster identity or comparing the current discovery window timing with the detected discovery window timing. Finally, upon detecting said different cluster, a security process is executed, which may warn the user or abort the connection sequence. Thereby, a malicious device trying to manipulate the connection sequence is detected.
METHOD AND APPARATUS FOR PERFORMING COMMUNICATION IN WIRELESS COMMUNICATION SYSTEM
A method for performing communication in a wireless communication system in includes establishing, by a network entity, a context of a user equipment (UE) in a network, receiving a message for registration request from the UE in a registered state, identifying that the UE is genuine by executing an authentication procedure with the UE, and in case that the UE is genuine, performing a deletion of the established context of the UE and a process of the registration request.