H04W12/062

OPERATION RELATED TO USER EQUIPMENT USING SECRET IDENTIFIER

A method performed by a network node of a serving public land mobile network, PLMN, associated with a user equipment, UE, comprising: obtaining a secret identifier that uniquely identifies the UE, wherein the secret identifier is a secret that is shared between the UE and at least a home PLMN of the UE and that is shared by the home PLMN with the network node; and performing an operation related to the UE using the secret identifier. Other methods, computer programs, computer program products, network nodes and a serving PLMN are also disclosed.

COMPUTER SYSTEM TO CONTINUOUSLY MAINTAIN A USER SESSION WHEN A DISPLAY DEVICE IS MECHANICALLY CONNECTED AND DISCONNECTED
20170372676 · 2017-12-28 ·

A computer system to continuously maintain a user session when a display device is mechanically connected and disconnected with a base processing device is described. The computer system allows the user to run applications during the user session on the base processing device and use the display device as a monitor. The display device can be detached from the base processing device, and the base processing device can continue miming the applications for the user session. In this mode, the separated display device can be used as a tablet form factor computing device which can accept user input and send the user input to the base processing device. Among other functions, the base processing device can operate with the display device disconnected by generating session content for the display device, including, for example, sending application content, video streams, and other content to the display device.

WIRELESS ACCESS POINT BASED CONTROL OVER WIRELESS DEVICE ASSOCIATION WITH WIRELESS ACCESS POINTS

Various example embodiments for supporting control over association of WiFi clients with WiFi access points are presented herein. Various example embodiments for supporting control over association of WiFi clients with WiFi access points may be configured to support control over association of WiFi clients with WiFi access points and radio bands of WiFi access points. Various example embodiments for supporting control over association of WiFi clients with WiFi access points and radio bands of WiFi access points may be configured to control association of WiFi clients with WiFi access points and radio bands of WiFi access points by refusing requests of WiFi clients (e.g., authentication requests, association requests, or the like), including sub-optimal requests of WiFi clients, based on WiFi access control information maintained on the WiFi access points.

Pre-authenticated online ordering system
09852461 · 2017-12-26 · ·

A computerized method and system for pre-authenticated online ordering are provided. A set of user authentication credentials are received from a user, the set of user authentication credentials sufficient to uniquely identify the user as being registered with a network-based publication system. A selection of an item from a plurality of items is received from the user. A unique address is provided to the user, the unique address allowing an unregistered user to access a user interface. An instruction associated with the selected item is received from the unregistered user via the accessed user interface.

Lighting based authentication of a mobile electronic device

A Light Emitting Diode (LED) based illumination device authenticates a mobile electronics device on a lighting communications network. The mobile electronic device may request a communications link on the lighting communications network and detect modulated illumination light emitted from the LED based illumination device. The modulated light may include an optical code. The mobile electronic device may determine the optical code from the modulated illumination light and communicate an indication of the optical code to the LED based illumination device. The LED based illumination device may determine if the indication of the optical code is correct and provide, in response, a communication link to the mobile electronics device on the lighting communications network.

Voice and text data service for mobile subscribers
20170366388 · 2017-12-21 · ·

Method and intelligent subscriber management unit for enabling voice and text data service from a public communication network (7) to a mobile subscriber device (1). Authenticating the mobile subscriber device (1) is achieved using a home location register (8) and/or authentication center (9), while the mobile subscriber device (1) is in reach of an access point (2) of a data network (3). A challenge response is received from a subscriber identity module (SIM) of the mobile subscriber device (1), and includes the international mobile subscriber identity (IMSI (16)). The IMSI (16) is stored in a visitor location register (17) which is attached to the home location register (8). Then conversion of voice and text data service is executed between a first data format suitable for the public communication network (7) and a second data format suitable for the data network (3).

Mobile terminal, and safety verification method and device for mobile payment
09848326 · 2017-12-19 · ·

Provided are a mobile terminal, and a safety verification method and device for mobile payment. The mobile terminal includes a payment card and an NFC chip, also includes: a conduction switch coupled between the payment card and the NFC chip, and configured to receive a control signal from a processor and control, according to the control signal, closing or opening of a conduction path between the financial card and the NFC chip; and the processor, which is configured to verify, before the financial card transacts with an external reader, verification information input by a user; generate, when the verification information input by the user passes the verification, a control signal for controlling the conduction switch to open the conduction path, and generate, when the verification information input by the user does not pass the verification, a control signal for controlling the conduction switch to close the conduction path.

ELECTRONIC DEVICE
20170359687 · 2017-12-14 ·

An electronic device includes a radio communication unit as an obtainment unit that obtains an SSID of position-dependent information, the position-dependent information being information depending on a position of the electronic device, and a storage in which an SSID table is stored, the SSID table managing the SSID obtained by the radio communication unit and authentication information used by a user to log in to the electronic device while correlating the SSID and the authentication information to each other. The electronic device also includes a controller that performs operating environment setting of the electronic device. The controller compares the SSID obtained in predetermined timing by the radio communication unit with an SSID corresponding to the authentication information about the currently logged-in user in SSIDs managed by the SSID table, and changes the operating environment setting of the electronic device according to a comparison result.

KEY GENERATION METHOD, DEVICE, AND SYSTEM
20170359719 · 2017-12-14 ·

Embodiments of the invention relate to the communications field, and provide a key generation method, device, and system. The method includes: after receiving a first command, obtaining, by UE located in a first-standard network, a type identifier of a second-standard network that needs to provide a service to the UE, where the first command is a service request response message, or a handover command, or any message in an air interface secure activation process; determining, by the UE, an access key according to the type identifier of the second-standard network, a key of the first-standard network, and a NAS count of the first-standard network by using a preset key derivation algorithm; and generating, by the UE, an AS key of the second-standard network according to the access key. The present invention can resolve problems of relatively long total communication latency and relatively high communication load of a heterogeneous network.

NETWORK-VISITABILITY DETECTION CONTROL
20170359344 · 2017-12-14 ·

A state of visitability of a network interface can be determined by receiving, via a network interface, an instruction. In response, a security request including data of a trigger can be transmitted to a network access point (NAP). A result associated with the security request can be determined, and a state of visitability of the NAP can be determined based at least in part on the result. The state of visitability can indicate whether a predetermined credential-evaluation entity is reachable via the NAP. In some examples, a network registry can receive an indication of a first NAP. The network registry can determine, based at least in part on stored registry information, an instruction associated with the first NAP, and transmit the instruction. In some examples, a terminal can transmit multiple security requests, and present a user interface indicating respective network access points and respective results.