Patent classifications
H04W12/082
Mobile device vehicle bonding with inactive bond records
A method for forming bonded mobile device connection with a vehicle includes determining a request count comprising a plurality of Bluetooth advertisement requests received from a mobile device with respect to time, determining an invalid Consumer Access Key (CAK) transmission count associated with the plurality of Bluetooth advertisement requests, generating an active bond record with the request count and the invalid CAK transmission count, determining, based on the active bond record, that a Global Attribute Profile (GATT) service associated with the mobile device is inactive, and disabling a Bluetooth advertisement response setting associated with the GATT service.
METHOD AND SYSTEM FOR PROVIDING PRIVACY PROTECTION IN PREPARATION FOR A PHONE CALL BETWEEN A VEHICLE OCCUPANT AND A REMOTE CONVERSATION PARTNER
A method for providing privacy protection in preparation for a phone call between a vehicle occupant of a vehicle and a remote conversation partner is provided. The method includes detecting, by an occupant detection system of the vehicle, additional listeners inside the vehicle. The method further includes receiving a call request with a telecommunication system in the vehicle for a phone call between the vehicle occupant and the remote conversation partner, the phone call being an outgoing call or an incoming call. The method further includes sending a notification to the remote conversation partner with the telecommunication system prior to establishment of the requested phone call informing the remote conversation partner about the presence of detected additional listeners.
Method and apparatus for erasing security-relevant information in a device
Provided is a method for erasing security-relevant information in a device, having the method steps of: ascertaining at least one movement parameter of the device over time, monitoring the ascertained movement parameters over time on the basis of at least one prescribed movement pattern, and triggering an erase process for the security-relevant information if the ascertained movement parameter over time is consistent with the at least one prescribed movement pattern. An apparatus and a computer program product for carrying out the method to ensure that security-relevant data of the device are erased reliably and completely even in the event of an accident or another unforeseen event is also provided.
METHOD AND APPARATUS FOR REVOKING USER EQUIPMENT AUTHENTICATION IN WIRELESS COMMUNICATION SYSTEM
A method for discarding authentication of a user equipment in a wireless communication system, including: determining, by a network, authentication revocation of a first remote user equipment; determining whether or not a PDU session of a relay user equipment, which is used by the first remote user equipment, is used by another remote user equipment; and transmitting, to the relay user equipment, a release request for the PDU session of the relay user equipment or a release request for a PC5 link of the first remote user equipment.
Remote User Device Deauthentication
Embodiments of the present disclosure are directed to systems and methods for remote deauthentication of electronic devices. A virtual authentication session manager or an electronic device maintains authentication across multiple electronic devices. The virtual authentication session manager receives authentication requests from electronic devices and generates a unique ID and a readable name for each device. A user can remotely deauthenticate any of the electronic devices that have previously been authenticated.
Remote User Device Deauthentication
Embodiments of the present disclosure are directed to systems and methods for remote deauthentication of electronic devices. A virtual authentication session manager or an electronic device maintains authentication across multiple electronic devices. The virtual authentication session manager receives authentication requests from electronic devices and generates a unique ID and a readable name for each device. A user can remotely deauthenticate any of the electronic devices that have previously been authenticated.
System, device and method for providing passenger or user information
A computer processing device for determining whether to allow or deny access to a database associated with the device is provided. The device is configured to determine the origin of data signed with a first key by comparing the key to one or more keys stored in a further database to identify the source of the data; search the database to determine one or more access rules associated with the source of the data, wherein the access rules define whether write access to the database is allowed or denied for the data; and allow or deny write access to the database based on the determined rule or rules.
System, device and method for providing passenger or user information
A computer processing device for determining whether to allow or deny access to a database associated with the device is provided. The device is configured to determine the origin of data signed with a first key by comparing the key to one or more keys stored in a further database to identify the source of the data; search the database to determine one or more access rules associated with the source of the data, wherein the access rules define whether write access to the database is allowed or denied for the data; and allow or deny write access to the database based on the determined rule or rules.
Connected vehicle communication with improved misbehavior processing
A form of the invention is applicable for use in conjunction with a security credential management system that produces and manages pseudonym digital certificates issued to vehicles and used by vehicles to establish trust in vehicle-to-vehicle communications, the security credential management system including a pseudonym certificate authority processor entity which issues pseudonym digital certificates to vehicles, a registration authority processor entity that validates, processes and forwards requests for pseudonym digital certificates to the pseudonym certificate authority processor entity, and a misbehavior authority processor entity that receives misbehavior reports from reporter vehicles that include information about the reporter vehicles and suspect misbehaving vehicles and is responsible for producing a list of revoked credentials; the pseudonym certificate processor entity and registration authority processor entity participating in producing linkage values to be contained within the issued pseudonym digital certificates, the linkage values being derived ultimately, using a one-way function, from linkage seeds thereby enabling, in predetermined circumstances, at least some of the certificates containing linkage values derived from a given linkage seed to be revoked. A method is set forth for improving operation of the security credential management system, including the following steps: in conjunction with deriving the linkage values from the linkage seeds, additionally producing encrypted linkage maps that relate, in encrypted form, linkage values with linkage seeds from which they are derived; determining particular linkage values deemed to be of interest based at least in part on information derived from misbehavior reports; and determining linkage seeds associated with the particular linkage values utilizing decryptions of the encrypted linkage maps.
System and method for continuous authentication of user entity identity using context and behavior for real-time modeling and anomaly detection
A system and method for secure authentication of user entity and user entity device identity. The system and method described herein allows an identity to be continuously proven because of user entity's behavior and their biometrics. With all the fraud and risk that exists today, if someone has a user entity's driver's license they can do a lot of harm. A primary identity provider passes user contextual and behavioral information to third party secondary identity providers to allow risk based continuous authentication and step up post-authorization authentication or termination of session as required upon detection of an anomaly.