Patent classifications
H04W12/069
METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR AUTHENTICATION USING A USER EQUIPMENT IDENTIFIER
Methods, computer program products, and apparatuses are provided for enabling a user equipment (UE) to connect to the wireless access network that support non-seamless wireless local area network (WLAN) offload (NSWO), such as using the UE's fifth generation (5G) credentials. An apparatus may include a processor and a memory storing computer program code configured to cause the apparatus to request, by the UE, a wireless connection to a network entity; receive, by the UE, from the network entity, an identity request; and in response to the identity request, cause transmission, by the UE, an identity response including a UE identifier to the network entity such that the UE is configured to establish a security context with the network entity upon successful authentication using the UE identifier.
Distributed one-time-use entry code generation for physical access control method of operation and mobile systems
A physical access control system enables acceptable portal entry codes upon receiving each physical access request by operating on the elapsed time from a previous physical access request to generate a temporal credential. The controller receives a plurality of physical access requests from a plurality of mobile application devices. Upon authenticating the first access request, the controller eliminates repetition from the space of acceptable successor requests from each mobile application device. Monotonic nonces advance the range of temporal code matches. Entry code generation is decentralized to distributed application devices and is inherently unknowable until a successor access request is initiated by the same application device.
CONNECTION OF NETWORK MEMBERS
A system includes a database to provide access to stored user profile information about a first user using a respective first mobile communications device and a second user profile, using a respective second mobile communications device. A computing device is to receive a unique member identifier from all communications devices from all users who are members of the network to associate with profiles and authenticate when users sign into a user account; send to the second mobile communications device, an invitation to accept or reject an invitation to connect to the first user including receiving personal attribute information from, or sharing personal attribute information with, the first user; receive, from the second user, an acceptance of the invitation to connect to the first user; and connect the first user and the second user through the computing device for personal communication between first user and the second user.
ACCESSING CORPORATE RESOURCES THROUGH AN ENROLLED USER DEVICE
Systems and methods are described for accessing resources of a Unified Endpoint Management (“UEM”) system through an enrolled device. In an example, an unenrolled device can be paired with an enrolled device. The unenrolled device can connect to the enrolled device on a local network. The enrolled device can verify the unenrolled device using a key provided during pairing. The unenrolled device can send requests for UEM resources to the enrolled device, which the enrolled device can send to a UEM server. The UEM server can send the requested UEM resources to the enrolled device, and the enrolled device can send the UEM resources to the enrolled device over the local network.
DEVICE ACCOUNT ACTIVATION
In various embodiments, a system, method, and computer readable medium of the present disclosure comprises authenticating, by a processor of a computing device, credential information of a user of the computing device; releasing, by a processor of the computing device and in response to authenticating the credential information, a first secret element to a secure element processor of the computing device; verifying, by the processor of the computing device from the secure element processor of the computing device, that the user is an authorized user of a first transaction account by comparing the first secret element with an issuer element associated with the first transaction account; and activating, by the processor of the computing device, the first transaction account for a transaction on the computing device.
USING ON-DEMAND APPLICATIONS TO PROCESS ENCRYPTED DATA FROM A CONTACTLESS CARD
A device may receive a uniform resource locator (URL) and encrypted data. The device may download a first application from an application server based on the URL. The device may download and execute the first application. The first application may receive the encrypted data.
Method and system for controlling UICC and EUICC
An electronic device is provided. The electronic device includes a UICC in which a first profile is installed, an eUICC, and a processor electrically connected with the UICC and the eUICC. The processor requests a second profile to be installed in the eUICC from a first server based on the first profile, receives the second profile from a second server associated with the first server, and installs the received second profile in the eUICC. The second profile and the first profile include the same subscriber identification information.
Method and system for controlling UICC and EUICC
An electronic device is provided. The electronic device includes a UICC in which a first profile is installed, an eUICC, and a processor electrically connected with the UICC and the eUICC. The processor requests a second profile to be installed in the eUICC from a first server based on the first profile, receives the second profile from a second server associated with the first server, and installs the received second profile in the eUICC. The second profile and the first profile include the same subscriber identification information.
Out-of-band authentication based on secure channel to trusted execution environment on client device
Provided is a process that affords out-of-band authentication based on a secure channel to a trusted execution environment on a client device. The authentication process includes one or more authentication steps in addition to verifying any credentials provided by a client device. A notification may be transmitted by a server to a device other than the client device attempting to access the asset. That device may be a mobile device with a trusted execution environment storing user credential information, and the server may store representations of those credentials. The mobile device collects user input credentials and transmits representations for matching the previously stored representations and signed data for verification by the server that received data originated from the mobile device. The access attempt by the client is granted based in part on the result of authenticating the data received from the mobile device in a response to the notification.
Access to secured networks for known entities
Techniques for connecting known entities to a protected network are described. A user device with a certified application installed is authenticated with an identification repository. The authentication is accomplished using credentials associated with the certified application. The user device is also enrolled with an authentication server and the authenticated user device is connected to the protected network.