H04W12/084

SYSTEM AND PLATFORM FOR ENGAGING EDUCATIONAL INSTITUTIONS AND STAKEHOLDERS
20230033728 · 2023-02-02 ·

A method for pushing a data within a template in an educational setting comprising: scanning, via a first user device, a first tag, said first user device having first a unique ID and said first tag being a master tag and comprising a first tag ID; scanning, via a second user device, a second tag, said second user device having a second unique ID and said second tag having a second tag ID and being controlled by said master tag; defining a template being loaded onto said second user device upon the scanning of the second tag; and wherein the template comprises data corresponding to said second tag ID, said second unique ID, and a time corresponding to the scanning of said second tag.

NORMALIZING AND SECURELY TRANSMITTING TELEMATICS DATA

Methods, systems, and storage media for securely transmitting information are disclosed. Exemplary implementations may: receive a user identification token from a mobile device associated with a first user; verify an identity of the first user utilizing the user identification token; provide a positive response token to the mobile device associated with the first user indicating the identity of the first user has been verified; based on providing the positive response token, receive telematics data, the user identification token, and a timestamp from the mobile device associated with the first user; normalize the received telematics data; based on privacy settings derived from the mobile device associated with the first user, receive permission, from the first user, to share the normalized telematics data; and based on receiving permission, from the first user, to share the normalized telematics data, transmitting at least a portion of the normalized telematics data to a second user.

APPARATUSES AND METHODS RELATING TO AUTHORISATION OF NETWORK FUNCTIONS
20220353255 · 2022-11-03 ·

This specification describes apparatus comprising means for sending, from a first network function service consumer instance to an authorisation server, a request for an access token for use in accessing a service provided by a network function service producer, wherein the request includes an identifier of a set of network function service consumer instances of which the first network function service consumer instance is a member; receiving, at the first network function service consumer instance from the authorisation server, an access token for use in accessing the service provided by the network function service producer, wherein the access token includes the identifier of the set of network function service consumer instances of which the first network function service consumer instance is a member; and sending, from the first network function service consumer instance to the network function service producer, a request to access the service provided by the network function service producer, wherein the request to access the service includes the access token.

EFFICIENT POLICY ENFORCEMENT USING NETWORK TOKENS FOR SERVICES - USER-PLANE APPROACH

One aspect relates to initiating, by a device, a connection with an application server associated with one or more application services. A gateway derives an uplink network token and/or a downlink network token. The tokens are provisioned to the device and/or an application server over the user-plane. The tokens are included with uplink and/or downlink packets, respectively. Another aspect relates to receiving a data packet at gateway. The gateway determines a requirement for a network token from the packet. The gateway derives the network token based on a device subscription profile maintained by a network. The network token may be sent with the packet to a destination address associated with the packet. A packet including a network token may be received at a gateway. The gateway may verify the network token and send the data packet to an application server or a device if the verifying is successful.

EFFICIENT POLICY ENFORCEMENT USING NETWORK TOKENS FOR SERVICES - USER-PLANE APPROACH

One aspect relates to initiating, by a device, a connection with an application server associated with one or more application services. A gateway derives an uplink network token and/or a downlink network token. The tokens are provisioned to the device and/or an application server over the user-plane. The tokens are included with uplink and/or downlink packets, respectively. Another aspect relates to receiving a data packet at gateway. The gateway determines a requirement for a network token from the packet. The gateway derives the network token based on a device subscription profile maintained by a network. The network token may be sent with the packet to a destination address associated with the packet. A packet including a network token may be received at a gateway. The gateway may verify the network token and send the data packet to an application server or a device if the verifying is successful.

Access controller for secure transactions

A method for performing secure transactions is disclosed. The method includes: providing an access controller between a core application and a third-party application, where the access controller prevents the third-party application from unauthorized access to the core application; receiving, by the access controller, a command from the third-party application to access the core application; transmitting, by the access controller, an authorization request to a secure application storing credentials of a user; providing, by the access controller, the third-party application with access to the core application in response to the access controller receiving notification from the secure application that the command is authorized; and preventing, by the access controller, the third-party application from accessing the core application in response to the access controller receiving notification from the secure application that the command is unauthorized.

METHOD AND APPARATUS FOR SECURELY MANAGING COMPUTER PROCESS ACCESS TO NETWORK RESOURCES THROUGH DELEGATED SYSTEM CREDENTIALS
20220353254 · 2022-11-03 ·

A system and method for granting access to network resources through access credentials given to an agent process running on each computer or machine where resource requesters reside. The system extends a traditional token-granting authorization system to the agent processes, where each agent has administrative access to machine information. The agent uses that access to acquire detailed information about resource requesters. Requester qualifications defined by the system limit requester access to resources, and are enforced both by the agent and by the central system on the network resource server. Resource requesters ask for a token for resource use from the agent, not the central system. The agent uses its credentials to get a token from the central system and then return the token to qualified requesters.

SYSTEM AND METHOD FOR ACCESS CONTROL USING NETWORK VERIFICATION
20230079416 · 2023-03-16 ·

Systems, methods, and computer program products for controlling access by applications to application data are provided. A computing device receives a request for access control data over a network and returns access control data to the requestor to control an applications access over the network to application data. The access control data returned to the requestor includes access-point dependent access control data to control the application's access to the application data based on the access point used to access the network.

SYSTEM AND METHOD FOR ACCESS CONTROL USING NETWORK VERIFICATION
20230079416 · 2023-03-16 ·

Systems, methods, and computer program products for controlling access by applications to application data are provided. A computing device receives a request for access control data over a network and returns access control data to the requestor to control an applications access over the network to application data. The access control data returned to the requestor includes access-point dependent access control data to control the application's access to the application data based on the access point used to access the network.

MULTI-CONNECTIVITY BASED VEHICLE-TO-EVERYTHING COMMUNICATIONS IN A WIRELESS NETWORK

The described technology is generally directed towards a multi-connectivity (three or more simultaneous communication links) framework in a wireless communication network, including aspects and components that support the operation of New Radio vehicle-to-everything (V2X) services. Aspects of the framework include initial access and V2X establishment, local manager selection, sidelink and cellular resource configuration, mobility and measurements (and reporting), group communication and vehicular platooning support, and V2X configuration and local manager association.