Patent classifications
H04B1/3816
Gateway-Based Anti-Theft Security System and Method
Improved systems and techniques are disclosed for controlling the security states of anti-theft security systems such as product display assemblies using security fobs. The tasks relating to fob authentication are offloaded to a computer system, and these authentications can be based on identifiers for the different security fobs. The interactions between security fobs and product display assemblies can be consistent regardless of the population of authorized security fobs by using a security code that is shared by the security fobs. When attempting to use a security fob to change a security status for a product display assembly, the provision of the code to the subject product display assembly can be predicated on authorization of the subject security fob by the computer system. The computer system can maintain a list of identifiers for authorized security fobs that is easily updated when new security fobs are added to or existing security fobs are de-authorized from the system.
Management of subscriber identity modules
Management of subscriber identity modules is disclosed. A server apparatus manages, in addition to or instead of mobile network operators, by a service provider, subscriptions to wireless communication networks. The server apparatus maintains subscriber identity module-specific usage records. Each usage record comprises a quantity quantifying amount of data transferred with each subscriber identity module and a limit setting the maximum allowed amount of data transfer for each subscriber identity module. The server apparatus compares periodically the quantity in each usage record with the limit in the same usage record, and if the quantity in the usage record is within a predetermined margin of the limit in the same usage record, transmits, with the data communication interface, to the mobile apparatus, a command to limit data transfer speed of the subscriber identity module defined by the usage record.
Management of subscriber identity modules
Management of subscriber identity modules is disclosed. A server apparatus manages, in addition to or instead of mobile network operators, by a service provider, subscriptions to wireless communication networks. The server apparatus maintains subscriber identity module-specific usage records. Each usage record comprises a quantity quantifying amount of data transferred with each subscriber identity module and a limit setting the maximum allowed amount of data transfer for each subscriber identity module. The server apparatus compares periodically the quantity in each usage record with the limit in the same usage record, and if the quantity in the usage record is within a predetermined margin of the limit in the same usage record, transmits, with the data communication interface, to the mobile apparatus, a command to limit data transfer speed of the subscriber identity module defined by the usage record.
SMARTPHONE FRAUD-PROOF AUTHORIZATION AND AUTHENTICATION FOR SECURE INTERACTIONS
Mobile devices and other devices used in transactions or interactions with other computer systems can be identified by an abstract composite of information unique to the device. For example, the device can record and store when a user first started the device (a date and time of first use), how the device is configured (including any hardware/software identifications, versions, install dates, time when configurations or installations occurred, etc.), etc. All of the information can be collected for a specified period of time (e.g., 30 minutes, 1 hour, etc.), periodically, or continually. This process yields a large collection of data, which can be condensed (a record before condensing the data may be approximately 10 to 50 MB). The data may then be encapsulated in a blockchain. At least a portion of the blockchain may then be exchanged to identify the device.
SMARTPHONE FRAUD-PROOF AUTHORIZATION AND AUTHENTICATION FOR SECURE INTERACTIONS
Mobile devices and other devices used in transactions or interactions with other computer systems can be identified by an abstract composite of information unique to the device. For example, the device can record and store when a user first started the device (a date and time of first use), how the device is configured (including any hardware/software identifications, versions, install dates, time when configurations or installations occurred, etc.), etc. All of the information can be collected for a specified period of time (e.g., 30 minutes, 1 hour, etc.), periodically, or continually. This process yields a large collection of data, which can be condensed (a record before condensing the data may be approximately 10 to 50 MB). The data may then be encapsulated in a blockchain. At least a portion of the blockchain may then be exchanged to identify the device.
Method and device for authenticating a mobile station on an alternative communications network
A method of authenticating a mobile station on an alternate communications network is disclosed, the mobile station being associated with a default communications network. The mobile station comprises a baseband processor to manage the antenna-related functions and a SIM card to accommodate a default SIM associated with the default communications network for receiving network credentials from the baseband processor. The method comprises providing a SIM card device to intercept communications between the baseband processor and the SIM card, monitoring the network credentials in respect of the network that the mobile station is actively in communication with, determining whether the mobile station needs to switch to an alternate network, and identifying or receiving from a user the alternate network, consulting a SIM bank, comprising at least one alternate SIM, and selecting an alternate SIM having a mobile station identification variable compatible with the alternate network, receiving a network authentication request on the mobile station from the alternate network, and allocating the selected mobile station identification variable to the mobile station so as to identify the user of the mobile station on the alternate network.
Method and device for authenticating a mobile station on an alternative communications network
A method of authenticating a mobile station on an alternate communications network is disclosed, the mobile station being associated with a default communications network. The mobile station comprises a baseband processor to manage the antenna-related functions and a SIM card to accommodate a default SIM associated with the default communications network for receiving network credentials from the baseband processor. The method comprises providing a SIM card device to intercept communications between the baseband processor and the SIM card, monitoring the network credentials in respect of the network that the mobile station is actively in communication with, determining whether the mobile station needs to switch to an alternate network, and identifying or receiving from a user the alternate network, consulting a SIM bank, comprising at least one alternate SIM, and selecting an alternate SIM having a mobile station identification variable compatible with the alternate network, receiving a network authentication request on the mobile station from the alternate network, and allocating the selected mobile station identification variable to the mobile station so as to identify the user of the mobile station on the alternate network.
Card holding device
According to one embodiment, a holder includes a recessed portion and including an opening, and includes a contact exposed from part of a bottom surface of the recessed portion. A lid covers the holder from the recessed portion side, makes a space in the recessed portion airtight in an engaged state in which the opening of the recessed portion is closed, and includes an elastic member pushing down a contained object contained in the recessed portion. And a lock mechanism forms the engaged state between the lid and the holder.
Method and system for dynamic managing of subscriber devices in mobile networks
A system and method for managing subscriber mobile devices comprising: a home network (400) of a first mobile network operator (MNO1), in which data associated with at least one physical SIM of a subscriber device with an embedded SIM card (eUICC) is obtained, and a destination network (300) of a second mobile network operator (MNO2) which the device travels to, obtaining static data and dynamic data associated with at least one virtual SIM (503, 603) of the device. The dynamic data comprise a subscriber authentication key (Ki) and is obtained from a SIM provider platform (500, 600) on which the destination network (300) relies. The static data comprise IMSI/MSISDN identities and is stored in a pool (202) of the destination network (300). For a given virtual SIM, it is checked whether there is an association in a mapping table (106) of the first mobile network operator (MNO1) between the static data from the pool (202) and the physical SIM data from the home network (400).
Method and system for dynamic managing of subscriber devices in mobile networks
A system and method for managing subscriber mobile devices comprising: a home network (400) of a first mobile network operator (MNO1), in which data associated with at least one physical SIM of a subscriber device with an embedded SIM card (eUICC) is obtained, and a destination network (300) of a second mobile network operator (MNO2) which the device travels to, obtaining static data and dynamic data associated with at least one virtual SIM (503, 603) of the device. The dynamic data comprise a subscriber authentication key (Ki) and is obtained from a SIM provider platform (500, 600) on which the destination network (300) relies. The static data comprise IMSI/MSISDN identities and is stored in a pool (202) of the destination network (300). For a given virtual SIM, it is checked whether there is an association in a mapping table (106) of the first mobile network operator (MNO1) between the static data from the pool (202) and the physical SIM data from the home network (400).