Patent classifications
H04W12/062
CONNECTION OF NETWORK MEMBERS
A system includes a database to provide access to stored user profile information about a first user using a respective first mobile communications device and a second user profile, using a respective second mobile communications device. A computing device is to receive a unique member identifier from all communications devices from all users who are members of the network to associate with profiles and authenticate when users sign into a user account; send to the second mobile communications device, an invitation to accept or reject an invitation to connect to the first user including receiving personal attribute information from, or sharing personal attribute information with, the first user; receive, from the second user, an acceptance of the invitation to connect to the first user; and connect the first user and the second user through the computing device for personal communication between first user and the second user.
METHOD AND SYSTEM FOR MANAGING ACCESS TO ENTITY IDENTITY DATA
A system and method for managing access to entity identity data are described. The system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to authenticate a remote device as being associated with an entity; receive, via the communications module and from the remote device, pre-consent data identifying one or more third parties permitted to access entity identity data for the entity; store, in the memory, the pre-consent data in association with the entity; receive, via the communications module and from a digital identity network, a signal representing a request to release the entity identity data to the third party; determine, based on the pre-consent data, that the entity identity data is to be released to the third party; and initiate release of the entity identity data to a computing device associated with the third party.
METHOD AND SYSTEM FOR MANAGING ACCESS TO ENTITY IDENTITY DATA
A system and method for managing access to entity identity data are described. The system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to authenticate a remote device as being associated with an entity; receive, via the communications module and from the remote device, pre-consent data identifying one or more third parties permitted to access entity identity data for the entity; store, in the memory, the pre-consent data in association with the entity; receive, via the communications module and from a digital identity network, a signal representing a request to release the entity identity data to the third party; determine, based on the pre-consent data, that the entity identity data is to be released to the third party; and initiate release of the entity identity data to a computing device associated with the third party.
USER AUTHENTICATION, FOR ASSISTANT ACTION, USING DATA FROM OTHER DEVICE(S) IN A SHARED ENVIRONMENT
Implementations set forth herein relate to an automated assistant that can solicit other devices for data that can assist with user authentication. User authentication can be streamlined for certain requests by removing a requirement that all authentication be performed at a single device and/or by a single application. For instance, the automated assistant can rely on data from other devices, which can indicate a degree to which a user is predicted to be present at a location of an assistant-enabled device. The automated assistant can process this data to make a determination regarding whether the user should be authenticated in response to an assistant input and/or pre-emptively before the user provides an assistant input. In some implementations, the automated assistant can perform one or more factors of authentication and utilize the data to verify the user in lieu of performing one or more other factors of authentication.
Provisioning of secure application
Methods and devices for provisioning a secure application on an electronic device with first issuer data for a first issuer are described. In an embodiment, the provisioning system receives and stores first issuer records. The example provisioning system receives a provisioning request to provision the secure application with the first issuer data. The provisioning request includes identifying information. The example provisioning system evaluates the provisioning request based on at least one of the first issuer evaluation criteria, the first issuer records and the identifying information in the provisioning request. When the provisioning request satisfies the first issuer evaluation criteria, the example provisioning system generates a signal using the communication module to provide the first issuer data to the electronic device to provision the secure application on the electronic device.
Provisioning of secure application
Methods and devices for provisioning a secure application on an electronic device with first issuer data for a first issuer are described. In an embodiment, the provisioning system receives and stores first issuer records. The example provisioning system receives a provisioning request to provision the secure application with the first issuer data. The provisioning request includes identifying information. The example provisioning system evaluates the provisioning request based on at least one of the first issuer evaluation criteria, the first issuer records and the identifying information in the provisioning request. When the provisioning request satisfies the first issuer evaluation criteria, the example provisioning system generates a signal using the communication module to provide the first issuer data to the electronic device to provision the secure application on the electronic device.
Method and apparatus for secure wireless vehicle bus communication
A system includes a processor configured to wirelessly broadcast a message obtained from a first originating vehicle BUS or controller, following a determination that the message was on a pre-approved list for broadcast and having encrypted the message utilizing a temporary random key generated for a message session. The system may include vehicle controllers, a gateway module, and vehicle BUSSES connecting the system controllers to the gateway module. The gateway module may include a memory storing a list of pre-approved message types and corresponding source types, and a processor configured to receive a message from one of the vehicle controllers over one of the vehicle BUSSES to determine if a message type and source type of the received message matches an element of the list.
Method and apparatus for secure wireless vehicle bus communication
A system includes a processor configured to wirelessly broadcast a message obtained from a first originating vehicle BUS or controller, following a determination that the message was on a pre-approved list for broadcast and having encrypted the message utilizing a temporary random key generated for a message session. The system may include vehicle controllers, a gateway module, and vehicle BUSSES connecting the system controllers to the gateway module. The gateway module may include a memory storing a list of pre-approved message types and corresponding source types, and a processor configured to receive a message from one of the vehicle controllers over one of the vehicle BUSSES to determine if a message type and source type of the received message matches an element of the list.
Operation related to user equipment using secret identifier
A method performed by a network node of a serving public land mobile network, PLMN, associated with a user equipment, UE, comprising: obtaining a secret identifier that uniquely identifies the UE, wherein the secret identifier is a secret that is shared between the UE and at least a home PLMN of the UE and that is shared by the home PLMN with the network node; and performing an operation related to the UE using the secret identifier. Other methods, computer programs, computer program products, network nodes and a serving PLMN are also disclosed.
Operation related to user equipment using secret identifier
A method performed by a network node of a serving public land mobile network, PLMN, associated with a user equipment, UE, comprising: obtaining a secret identifier that uniquely identifies the UE, wherein the secret identifier is a secret that is shared between the UE and at least a home PLMN of the UE and that is shared by the home PLMN with the network node; and performing an operation related to the UE using the secret identifier. Other methods, computer programs, computer program products, network nodes and a serving PLMN are also disclosed.