Patent classifications
H04W12/084
Authentication techniques in response to attempts to access sensitive information
The present disclosure describes techniques for changing a required authentication type based on a request for a particular type of information. For example, consider a situation where a user has asked a virtual assistant “who owns this device?” By default, the device may allow biometric authentication to unlock. In response to identification of the owner by the virtual assistant, however, the device may require one or more other types of authentication (e.g., manual entry of a passcode) to unlock the device. In various embodiments, the disclosed techniques may increase the security of the device by making it more difficult for malicious entities to obtain the sensitive information or to access device functionality once the sensitive information has been disclosed. In various embodiments, this may prevent or reduce unauthorized access to the device.
5G PROSE SERVICE BASED DISCOVERY
Methods and apparatuses are described herein for proximity-based services (ProSe) service-based discovery. For example, a service utilizing-wireless transmit/receive unit (SU-WTRU) may be provisioned with a type of discovery on a per-service basis and a security credential on a per-service basis. The SU-WTRU may transmit (315) a PC5 discovery message with the type of discovery and a first security element that is generated based on the security credential. The WTRU may then receive (325), from a service providing-wireless transmit/receive unit (SP-WTRU), a PC5 discovery response message that includes a second security element and a service identity associated with a service that the SP-WTRU provides. On a condition that the second security element is verified based on the provisioned security credential, the SU-WTRU may authorize (330) the SP-WTRU to establish a PC5 communication link with the SP-WTRU.
5G PROSE SERVICE BASED DISCOVERY
Methods and apparatuses are described herein for proximity-based services (ProSe) service-based discovery. For example, a service utilizing-wireless transmit/receive unit (SU-WTRU) may be provisioned with a type of discovery on a per-service basis and a security credential on a per-service basis. The SU-WTRU may transmit (315) a PC5 discovery message with the type of discovery and a first security element that is generated based on the security credential. The WTRU may then receive (325), from a service providing-wireless transmit/receive unit (SP-WTRU), a PC5 discovery response message that includes a second security element and a service identity associated with a service that the SP-WTRU provides. On a condition that the second security element is verified based on the provisioned security credential, the SU-WTRU may authorize (330) the SP-WTRU to establish a PC5 communication link with the SP-WTRU.
Multi-connectivity based vehicle-to-everything communications in a wireless network
The described technology is generally directed towards a multi-connectivity (three or more simultaneous communication links) framework in a wireless communication network, including aspects and components that support the operation of New Radio vehicle-to-everything (V2X) services. Aspects of the framework include initial access and V2X establishment, local manager selection, sidelink and cellular resource configuration, mobility and measurements (and reporting), group communication and vehicular platooning support, and V2X configuration and local manager association.
Accountless device control
Systems and methods for accountless device control are disclosed. For example, a smart device may be acquired and plugged in for use. The smart device may gain network connectivity and a system associated with the smart device may request enablement of an application for use with the smart device from another system, such as a system associated with a voice-enabled device. The other system may generate and send user identifier data, and the system associated with the smart device may generate a shadow account in association with the user identifier data. The application may be enabled in association with the shadow account, and access credentials may be exchanged to securely send and receive information associated with operation of the access device.
Method and electronic device for information processing
An information processing method includes establishing, in response to a distance between a first electronic device and a second electronic device being less than a distance value, a communication connection between a first communication assembly of the first electronic device and a second communication assembly of the second electronic device; obtaining, by the first electronic device, information of the second electronic device through the first communication assembly and the second communication assembly; and connecting the first electronic device to a network based on the information.
TRANSFERRING VERIFIABLE ADDRESS RIGHTS BETWEEN DEVICES OF A DATA CENTER (DC) NETWORK
Techniques for transferring address rights (e.g., internet protocol address(es), media access control address(es), etc.) amongst devices in a data center network fabric. A data center (DC) authority (e.g., network controller and/or a service controller) of a data center network fabric may determine that a device in the network is to communicate on an address in the network. The DC authority may create and sign a token that indicates a verifiable authorization to communicate on the address. The token may allow any device that posses the token to communicate on the address, following verification from an associated network switch. Additionally, the token may be signed by a device in the network in possession of the token, and delegated to another device in the data center network fabric following a migration of a service from one server to another, for example.
INTERNET-OF-THINGS DEVICE REGISTRATION METHOD AND APPARATUS, DEVICE, AND STORAGE MEDIUM
The present disclosure relates to the technical field of the Internet of Things (IoT), and provides an IoT device registration method and apparatus, a device, and a storage medium. The method includes: receiving a first registration request from an IoT device. The first registration request carries access configuration information and a target device identifier of the IoT device. The access configuration information is provided by a configurator for the IoT device, and includes a first access token and/or a first user identifier of a user account used by the configurator.
INTERNET-OF-THINGS DEVICE REGISTRATION METHOD AND APPARATUS, DEVICE, AND STORAGE MEDIUM
The present disclosure relates to the technical field of the Internet of Things (IoT), and provides an IoT device registration method and apparatus, a device, and a storage medium. The method includes: receiving a first registration request from an IoT device. The first registration request carries access configuration information and a target device identifier of the IoT device. The access configuration information is provided by a configurator for the IoT device, and includes a first access token and/or a first user identifier of a user account used by the configurator.
Assisting Users with Efficient Information Sharing among Social Connections
In one embodiment, a method includes receiving a user input from a first user at the first client system, determining that the user input is a sharing request to share content, determining multiple second users the sharing request is directed to, determining, for each second user, modalities associated with the respective second user based on the content, a user profile associated with the respective second user, and modalities supported by a second client system the respective second user is currently engaged with, the respective second user being associated with two or more second client systems, and sending, to one or more second client systems currently associated with the second users, instructions for accessing the content based on the determined modalities for each second user.