Patent classifications
H04W12/062
Single sign-on control function (SOF) for mobile networks
A new control function is defined for the control plane of a 5G mobile network to enable the operator's mobile user, who is using a premium network slice, to access application services on the public Internet, by operator sign-on only when accessing the application on said slice. This unique single sign-on capability allows the user to bypass the service authentication after operator authenticates the mobile device by the user session establishment procedure. The new function registers a plurality of service applications, which sign-up for single sign-on capability. It also coordinates the mapping and storage of credentials of the user across the mobile operator's service and the service provider's application for each of said plurality of service applications, and transfers user credentials to the application so that the user's sign-in step is bypassed.
Method and system for pro-active desktop resume operation based on historical data
A system and method for resuming a remote desktop for a networked client device. An access control system accepts login data from a user input to a networked client device, and/or user activity data collected by an agent running on the desktop. The networked client device may include a client application. A data center allows access to an activated desktop to the networked client device. The access control system suspends the desktop when the user is inactive in operating the client device. The access control system resumes the desktop on the networked client device in relation to a predicted start time. The predicted start time is based on login data from past logins by the user on networked client devices.
BOOTSTRAPPING AND TROUBLESHOOTING OF REMOTE DEVICES
A method for remotely configuring a network device using a user device and a network management service is provided. The user device includes a first communication interface and a second communication interface, and the method includes: initiating, by the user device, a communication channel with the network device using the second communication interface; after the communication channel is established: obtaining, by the user device via the first communication interface, configuration information for the network device from the network management service; and sending, by the user device, the configuration information to the network device via the communication channel. The user device is in communication with the network management service via the first communication interface, and the user device is configured as a pass-through device that relays the configuration information from the network management service to the network device.
BOOTSTRAPPING AND TROUBLESHOOTING OF REMOTE DEVICES
A method for remotely configuring a network device using a user device and a network management service is provided. The user device includes a first communication interface and a second communication interface, and the method includes: initiating, by the user device, a communication channel with the network device using the second communication interface; after the communication channel is established: obtaining, by the user device via the first communication interface, configuration information for the network device from the network management service; and sending, by the user device, the configuration information to the network device via the communication channel. The user device is in communication with the network management service via the first communication interface, and the user device is configured as a pass-through device that relays the configuration information from the network management service to the network device.
Optimizing clusters of Wi-Fi networks
Systems and methods for optimizing a cluster of Wi-Fi networks operating within a vicinity of each other are provided. In one implementation, a method includes detecting a cluster of Wi-Fi networks operating independently of each other, where the cluster is defined in that each Wi-Fi network includes a wireless transceiver configured to receive at least a minimum amount of signal power from one or more other wireless transceivers of one or more other Wi-Fi networks of the cluster. The method includes determining a plurality of Wi-Fi networks of the cluster that are enabled for cooperative optimization. Also, the method includes assigning a Wi-Fi channel selected from a plurality of available Wi-Fi channels to each of the wireless transceivers associated with the plurality of Wi-Fi networks enabled for cooperative optimization to reduce a total amount of potential interference in the cluster caused by the signal power received from independently-operated wireless transceivers.
Optimizing clusters of Wi-Fi networks
Systems and methods for optimizing a cluster of Wi-Fi networks operating within a vicinity of each other are provided. In one implementation, a method includes detecting a cluster of Wi-Fi networks operating independently of each other, where the cluster is defined in that each Wi-Fi network includes a wireless transceiver configured to receive at least a minimum amount of signal power from one or more other wireless transceivers of one or more other Wi-Fi networks of the cluster. The method includes determining a plurality of Wi-Fi networks of the cluster that are enabled for cooperative optimization. Also, the method includes assigning a Wi-Fi channel selected from a plurality of available Wi-Fi channels to each of the wireless transceivers associated with the plurality of Wi-Fi networks enabled for cooperative optimization to reduce a total amount of potential interference in the cluster caused by the signal power received from independently-operated wireless transceivers.
RESOURCE PROCESSING TERMINAL DEVICE WITH ENHANCED SECURE RESOURCE TRANSMISSIONS BASED ON IMAGE CAPTURE
Embodiments of the invention are directed to systems, methods, and computer program products for enhanced secure resource transmissions based on image capture via a resource processing terminal device. The invention provides a secure platform for transformation and structuring of resource data at a resource instrument device, and authentication of resource data, prior to initiation of a resource activity at the resource processing terminal device. Specifically, the invention is structured to construct an authorized credential element for processing of a resource activity at a first time interval prior to initiation of the resource activity. The invention is structured to execute a first resource processing activity at a subsequent time interval using the first authorized credential element, upon determining that the authorized credential element is compatible with the activity, and that the authorized credential element is pre-authenticated.
AUTHENTICATION DEVICE, NETWORK DEVICE, COMMUNICATION SYSTEM, AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
Provided is an authentication device capable of generating a master key suited to a UE in a 5GS. The authentication device (10) includes a communication unit (11) configured to, in registration processing of user equipment (UE), acquire UE key derivation function (KDF) capabilities indicating a pseudo random function supported by the UE, a selection unit (12) configured to select a pseudo random function used for generation of a master key related to the UE by use of the UE KDF capabilities, and a key generation unit (13) configured to generate a master key related to the UE by use of the selected pseudo random function.
AUTHENTICATION DEVICE, NETWORK DEVICE, COMMUNICATION SYSTEM, AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
Provided is an authentication device capable of generating a master key suited to a UE in a 5GS. The authentication device (10) includes a communication unit (11) configured to, in registration processing of user equipment (UE), acquire UE key derivation function (KDF) capabilities indicating a pseudo random function supported by the UE, a selection unit (12) configured to select a pseudo random function used for generation of a master key related to the UE by use of the UE KDF capabilities, and a key generation unit (13) configured to generate a master key related to the UE by use of the selected pseudo random function.
APPARATUS AND METHOD OF COMMUNICATION
An apparatus and a method of communication are provided. The method includes receiving a failure indication from a system if the system determines that a request of a mobile device to obtain an unmanned aerial system (UAS) service has failed at an authentication, an authorization, and/or a registration. This can provide a failure indication from a system when an authentication, an authorization, and/or a registration from a mobile device to the system fails. The system includes a UAS service supplier (USS) and/or a UAS traffic management (UTM). The mobile device comprises a user equipment and/or an unmanned aerial vehicle (UAV). The network comprises a 3GPP network.