H04W12/068

Authentication method, wearable device and mobile device

In an authentication method, a wireless communication is established between a mobile device and a wearable device. A proximity is detected between the mobile device and the wearable device by comparing mobile device position information and wearable device position information. Access to the mobile device is granted based on a detected proximity.

SYSTEM AND METHOD OF DYNAMIC AND SCALABLE IoT FRAMEWORK

A method and a system for providing one or more services to one or more user devices

in an IoT network in a scalable M2M (Machine to Machine) framework. The method comprises receiving a connection request from the one or more user devices [202] at a load balance of the IoT network, the connection request comprises at least a username comprising a cluster identifier. The load balancer [204] determines a cluster identifier based on the connection request and identifies at least one target cluster from the one or more clusters [206], said target cluster being associated with the identifier cluster identifier. The load balancer [204] routes the connection request to the at least one target cluster to provide the one or more services to the one or more user devices [202].

Communication device and non-transitory computer-readable medium storing computer-readable instructions for communication device
11706620 · 2023-07-18 · ·

A communication device may accept an input of user authentication information, cause an output unit to output specific information obtained by using a public key in a case where authentication using the inputted user authentication information is successful. In a case where the authentication using the inputted user authentication information fails, the specific information is not outputted. The communication device may receive an authentication request in which the public key is used from a first external device, send an authentication response to the first external device, receive first connection information from the first external device, and establish a first wireless connection between the communication device and a second external device by using the first connection information.

Output system, information processing system, including circuitry to generate a character string to perform authentication for a user, and authentication method
11704079 · 2023-07-18 · ·

An output system includes circuitry to generate information on a character string in response to an authentication request including user identification information transmitted from an output apparatus. The circuitry further transmits the information on the character string to an information processing device. In response to receiving the information on the character string and the user identification information from the output apparatus that has received the information on the character string and the user identification information from the information processing device, the circuitry further performs authentication for a user identified by the user identification information, based on the information on the character string and the user identification information, and transmits an authentication result to the output apparatus.

CREDENTIAL GATEWAY

Methods and systems are provided for performing operations comprising: receiving, by a credential gateway from a client device, a request to obtain a digital credential for accessing a secure resource, the credential gateway being configured to coordinate an exchange of digital credentials associated with different secure resource types with a plurality of client devices; communicating the request to a server associated with the secure resource; receiving, by the credential gateway from the server associated with the secure resource, a data object that includes the digital credential; selecting, by the credential gateway, based on the data object, a security protocol from a plurality of security protocols; and providing, by the credential gateway, the digital credential to the client device in accordance with the selected security protocol.

Method and apparatus for securing a remote device
11706208 · 2023-07-18 · ·

A system and method for security of Internet of things (IoT) devices are discussed. A user of a mobile device, such as a customer of a wireless communication network, may remotely lock an IoT device while concomitantly assigning an ad hoc password to the IoT device that can be subsequently used to unlock the device. Alternatively, an IoT device may self-lock and produce a password in response to detecting its motion. The produced password may be provided to the user of a mobile device and used later to unlock the IoT device.

Methods and systems for mitigating denial of service (DoS) attack in a wireless network

The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4.sup.th-Generation (4G) communication system such as Long Term Evolution. Methods and systems for mitigating Denial of Service (DOS) attacks in wireless networks, by performing admission control by verifying a User Equipment's (UE's) registration request via a Closed Access Group (CAG) cell without performing a primary authentication are provided. Embodiments herein disclose methods and system for verifying permissions of the UE to access a CAG cell based on the UE's Subscription identifier, before performing the primary authentication. The method for mitigating DOS attacks in wireless networks includes requesting a public land mobile network for accessing a non-public network (NPN) through a CAG cell, verifying the permissions of a UE to access the requested NPN through the CAG cell, and performing a primary authentication.

Computer-based systems configured for one-time passcode (OTP) protection and methods of use thereof

Systems and methods of anti-vishing OTP protection via machine learning techniques are disclosed. In one embodiment, an exemplary computer-implemented method may comprise: receiving a permission indicator identifying a permission by the user to detect OTPs and calls being received by a computing device; receiving an indication of an OTP data item being received; processing the OTP data item to determine a time duration during which a particular OTP included therein is valid; utilizing a trained OTP protection machine learning model to determine phone number(s) as presenting a security risk with respect to the OTP data item; and instructing the computing device to commence at least one security measure based at least in part on a contact list updated with an indication that the phone number(s) present a security risk with regard to the particular OTP during the time duration of the particular OTP.

AUTHENTICATING A CUSTOMER TO A RISK LEVEL USING AN AUTHORIZATION TOKEN

Disclosed herein are system, method, and computer program product embodiments for authenticating a mobile user via an authentication method determined based on a token level associated with the action being completed. An authentication token is created corresponding to the token level and the authentication token is sent to the mobile device. This authentication token may be used to authenticate subsequent actions and engage various services to complete the actions using application programming interfaces. The authentication token stored on the mobile device obviates the need for a user to authenticate multiple times to complete actions requiring a similar token level. The system may authenticate the identity of the mobile user using various authentication methods.

WIRELESS CONNECTION INFORMATION GENERATION, DISTRIBUTION, AND USE

According to one configuration, a communication management resource such as a SIM provisioning platform receives input from a mobile communication device to activate use of the mobile communication device in a private wireless network. The communication management resource authenticates use of the mobile communication device in the private wireless network. Subsequent to authentication, the communication management resource populates an access file such as private SIM (Subscriber Identity Module) information for use by the mobile communication device to access the private wireless network. The access file is populated with information such as a unique cell identifier value, encryption information, identification of supported services, etc. The communication management resource communicates the newly generated access file (such as SIM information) to the mobile communication device, enabling the mobile communication device use of the private wireless network.