H04W12/084

Methods, apparatuses, and systems for network analysis

Methods, systems, apparatuses, and computer readable media for providing a network analysis system are disclosed. An example of a system for providing a network analysis system includes at least one satellite device configured to monitor wireless network traffic to determine at least one network communication event, generate an event message based on the at least one network communication event, and transmit the event message. The system also includes a controller device configured to receive the event message, determine an identity of at least one device communicating during the network communication event, determine a network status based at least in part on the identity of the at least one device, and provide the network status via an interface.

Methods, apparatuses, and systems for network analysis

Methods, systems, apparatuses, and computer readable media for providing a network analysis system are disclosed. An example of a system for providing a network analysis system includes at least one satellite device configured to monitor wireless network traffic to determine at least one network communication event, generate an event message based on the at least one network communication event, and transmit the event message. The system also includes a controller device configured to receive the event message, determine an identity of at least one device communicating during the network communication event, determine a network status based at least in part on the identity of the at least one device, and provide the network status via an interface.

Secondary device authentication proxied from authenticated primary device

A method of authenticating a secondary communication device based on authentication of a primary mobile communication device is disclosed. Trust is established with the primary mobile communication device by a device authentication server (DAS). The DAS receives an authorization code request from a secondary application operating on the secondary communication device, and transmits an authorization code to the secondary communication device. The DAS receives the authorization code from a primary application operating on the primary mobile communication device. The DAS authorizes the secondary application based on the trust with the primary mobile communication device and the authorization code from the primary application. The DAS transmits a secondary token to the secondary application at the secondary communication device to allow initialization of a communication session from the secondary application on behalf of the primary mobile communication device.

Secondary device authentication proxied from authenticated primary device

A method of authenticating a secondary communication device based on authentication of a primary mobile communication device is disclosed. Trust is established with the primary mobile communication device by a device authentication server (DAS). The DAS receives an authorization code request from a secondary application operating on the secondary communication device, and transmits an authorization code to the secondary communication device. The DAS receives the authorization code from a primary application operating on the primary mobile communication device. The DAS authorizes the secondary application based on the trust with the primary mobile communication device and the authorization code from the primary application. The DAS transmits a secondary token to the secondary application at the secondary communication device to allow initialization of a communication session from the secondary application on behalf of the primary mobile communication device.

Automated Delivery Security System

A method and system for providing access to a location secured by an electronically activated locking mechanism, the method comprising: detecting a geographical position of a mobile device. Determining that the detected geographical position of the mobile device is proximate to the location secured by the electronically activated locking mechanism. Transmitting a signal causing the electronically activated locking mechanism to unlock.

Automated Delivery Security System

A method and system for providing access to a location secured by an electronically activated locking mechanism, the method comprising: detecting a geographical position of a mobile device. Determining that the detected geographical position of the mobile device is proximate to the location secured by the electronically activated locking mechanism. Transmitting a signal causing the electronically activated locking mechanism to unlock.

Systems and methods for provisioning funding card numbers to third party wallets

Systems, methods, and devices for provisioning funding card numbers to merchant wallets are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for provisioning funding card numbers to third party wallets may include: (1) authenticating a customer using an electronic device; (2) redirecting the customer to a third-party website; (3) receiving, from the third-party website and via a first API, a request for funding primary account numbers (FPANs) associated with the customer; (4) providing the third-party website with a plurality of FPAN identifiers for FPANs associated with the customer; (5) receiving, from the third-party website and via a second API, a request for a FPAN associated with a selected FPAN identifier; (6) encrypting the FPAN associated with the selected FPAN identifier; and (7) communicating the encrypted FPAN to the third-party website.

Systems and methods for provisioning funding card numbers to third party wallets

Systems, methods, and devices for provisioning funding card numbers to merchant wallets are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for provisioning funding card numbers to third party wallets may include: (1) authenticating a customer using an electronic device; (2) redirecting the customer to a third-party website; (3) receiving, from the third-party website and via a first API, a request for funding primary account numbers (FPANs) associated with the customer; (4) providing the third-party website with a plurality of FPAN identifiers for FPANs associated with the customer; (5) receiving, from the third-party website and via a second API, a request for a FPAN associated with a selected FPAN identifier; (6) encrypting the FPAN associated with the selected FPAN identifier; and (7) communicating the encrypted FPAN to the third-party website.

Method and apparatus for securely managing computer process access to network resources through delegated system credentials

A system and method for granting access to network resources through access credentials given to an agent process running on each computer or machine where resource requesters reside. The system extends a traditional token-granting authorization system to the agent processes, where each agent has administrative access to machine information. The agent uses that access to acquire detailed information about resource requesters. Requester qualifications defined by the system limit requester access to resources, and are enforced both by the agent and by the central system on the network resource server. Resource requesters ask for a token for resource use from the agent, not the central system. The agent uses its credentials to get a token from the central system and then return the token to qualified requesters.

SERVICE AUTHORIZATION METHOD, APPARATUS, AND SYSTEM
20230019000 · 2023-01-19 ·

Embodiments of this application relate to a service authorization method and system, and an apparatus. The method includes: A first NRF receives a first request requesting an access token for accessing service of a second NF in a second network from a first NF, where the first NF and the first NRF are located in a first network, and the first request includes SNPN information of the first network and/or the second network. The first NRF forwards the first request to a second NRF located in the second network. The second NRF generates an access token in response to the first request, where the access token includes the SNPN information of the first network and/or the second network. The second NRF sends the access token to the first NRF. The first NRF receives the access token and sends the access token to the first NF.