H04W12/068

Bootstrapping devices on a network

Methods for operating a device and for managing bootstrapping of devices are disclosed. The method (100) for operating a device comprises computing (102) a derivative of a secret shared between the device and a server entity of a network, generating (104) a temporary bootstrap URI by combining at least a part of the computed derivative with a static bootstrap URI for the network, and sending (106) a bootstrap request to the temporary bootstrap URI. The method for managing bootstrapping of devices comprises generating temporary bootstrap URIs corresponding to devices operable to connect to a network, and updating a network DNS registry to map the generated temporary bootstrap URIs to the IP address of at least one of a bootstrap server instance reachable via the network and/or a bootstrap load balancer. Also disclosed are a device, a bootstrap load balancer, a bootstrap server, and a computer program.

METHOD AND APPARATUS FOR AUTHENTICATING AND AUTHORIZING NETWORK FUNCTION IN MOBILE COMMUNICATION SYSTEM
20230027515 · 2023-01-26 ·

The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Provided is a method by which a network function (NF) service consumer entity operates in a wireless communication system. The method by which the NF service consumer entity operates includes transmitting, to a service communication proxy (SCP) entity, a service request message including at least one of a client credentials assertion (CCA) credential of the NF service consumer entity, or information related to an NF service producer entity, receiving, from the SCP entity, a service response message, wherein the service response message generated by the NF service producer entity is forwarded by the SCP entity to the NF service consumer entity, and authenticating the NF service producer entity based on the service response message.

System and method for authenticating called parties of individuals within a controlled environment
11563734 · 2023-01-24 · ·

A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.

Method of securing radio communication between an aircraft and a ramp agent
20230232225 · 2023-07-20 ·

A method of securing radio communication between a ramp agent and an aircraft provided with a base station adapted to transmit a beacon signal includes establishing a first database identifying organizations such as aircraft operators and authorized service providers; for each organization, establishing a second database identifying the ramp agents that it employs and associating biometric data with each ramp agent; providing the ramp agent with a terminal; and when attempting to establish communication between the ramp agent and the aircraft, performing two checks relating firstly to the identity of the ramp agent and secondly to the ramp agent's employer organization in order to verify whether the agent is indeed authorized to establish such communication.

AUTOMATED MESSAGE ROUTING CHANGES BASED ON COMPLETION RATE
20230232223 · 2023-07-20 ·

Systems and methods for routing messages are disclosed herein. The methods can include maintaining, at a computing system, a plurality of completion rates, wherein each completion rate is associated with a communication network. The methods can also include receiving, from a service provider, a request to authenticate an end user of the service provider, generating an authentication message, and selecting, based on the maintained completion rates, a communication network from a plurality of communication networks. The methods can further include transmitting the authentication message to a device associated with the end user using the selected communication network, receiving an indication that the end user performed an action in response to receiving the authentication message, determining whether the end user has been authenticated based on the end user’s action, and updating the maintained completion rate associated with the selected communication network based on the determination.

METHODS AND SYSTEMS FOR PUSHING DATA TO CLIENT DEVICES OVER A TELECOMMUNICATIONS DATA NETWORK
20230232224 · 2023-07-20 ·

Methods and/or systems for pushing data to identity components installed in the client devices. The systems include a credential management server, a network modem, and/or an identity component. The methods include establishing communications between a credential management server and an identity component.

SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
20230231843 · 2023-07-20 · ·

A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.

DYNAMIC MODIFICATION OF A VERIFICATION METHOD ASSOCIATED WITH A TRANSACTION CARD
20230230095 · 2023-07-20 ·

A device may determine that a verification method associated with a transaction card is to be modified from a first verification method to a second verification method. The first verification method and the second verification method may use different types of verification information. The device may provide a set of instructions to the transaction card after determining that the verification method is to be modified. The set of instructions may cause the transaction card to modify the verification method from the first verification method to the second verification method. The device may provide information identifying a modification to the verification method to a transaction backend device to notify the transaction backend device that the verification method associated with the transaction card has been modified from the first verification method to the second verification method.

Method for securing electronic transactions
11706212 · 2023-07-18 · ·

A method for securing electronic transactions includes associating a mobile electronic device with a first user. A first computer system retrievably stores registration data relating to the first user, including a device identifier that is unique to the mobile electronic device. A security application that supports in-application push notifications is installed on the mobile electronic device. The first computer system sends a push notification to the mobile electronic device, the push notification prompting the first user to provide a confirmation reply via a user interface of the security application for activating the mobile electronic device as a security token. The mobile electronic device is activated as a security token for the first user in response to receiving at the first computer system, from the mobile electronic device, the confirmation reply from the first user.

Security authentication system for membership login of online website and method thereof
11706031 · 2023-07-18 · ·

A security authentication system for a website provides a safe login without having to directly enter an ID and a password on a user device requesting login to the website. A first user device receives one-time use authentication information from a second user device after the second user device received the one-time use authentication information from an authentication server without the authentication server receiving user login authentication information from the second user device. A request is transmitted to the authentication server based on the one-time use authentication information and the user login authentication information. In response to the request, one-time password (OTP) information is received from the authentication server. The OTP information is presented by the first user device, such that the OTP information can be entered into the second user device and used in a request to log in to the website.