H04W12/104

Privacy-preserving identity-validated transactions

Disclosed are various embodiments for anonymously validating the identities of multiple parties participating a transaction. In one embodiment, a system is configured to determine a location of the system is within a proximity threshold of a location and transmit an arrival indication to a remote computing device. The system is also configured to receive an encryption key from the remote computing device and detect a client device located at the location. The encryption key can be transmitted to the client device for validation that the location of the computing device is the location.

Geographic location consensus determination

Techniques are disclosed relating to determining whether geographic locations of a user computing device satisfy a location consensus threshold. A computer system receives results of a plurality of location determination operations, each of which specifies a geographic location of a computing device initiating an action. The computer system then makes a determination whether the received results satisfy a consensus threshold as to geographic location of the computing device. In some embodiments, the determination is usable to select, from a plurality of sets of rules for different geographic regions, a particular set of rules for processing the action. In some cases, the particular set of rules is usable to determine whether to process the action. Such techniques may advantageously allow a processing system to understand how to process actions initiated by a computing device associated with different geographic locations.

DETERMINATION SYSTEM, DETERMINATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM

A determination system includes: a memory; and a processor coupled to the memory and programmed to execute a process comprising: acquiring location data representing a location of one or more user devices including a first sensor; searching for one or more public devices that is at a location corresponding to the location of the user device and that includes a second sensor having a same function as that of the first sensor included in the user device; requesting the user device to measure using the first sensor to acquire measurement data of the first sensor; acquiring measurement data of the second sensor included in the public device; and determining whether a user of the user device is legitimate based on a result of matching the measurement data of the first sensor with the measurement data of the second sensor.

DETERMINATION SYSTEM, DETERMINATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM

A determination system includes: a memory; and a processor coupled to the memory and programmed to execute a process comprising: acquiring location data representing a location of one or more user devices including a first sensor; searching for one or more public devices that is at a location corresponding to the location of the user device and that includes a second sensor having a same function as that of the first sensor included in the user device; requesting the user device to measure using the first sensor to acquire measurement data of the first sensor; acquiring measurement data of the second sensor included in the public device; and determining whether a user of the user device is legitimate based on a result of matching the measurement data of the first sensor with the measurement data of the second sensor.

Method and system for relay attack prevention incorporating motion
11696136 · 2023-07-04 · ·

A method and system for detecting if a relay is present in a PEPS system for a vehicle is provided by (a) determining whether movement of an authentication device was detected within a predefined time period after the authentication device enters a PEPS entry operational region; and (b) determining if the authentication device was stationary for a predetermined time period during a PEPS entry triggering event.

Method and system for relay attack prevention incorporating motion
11696136 · 2023-07-04 · ·

A method and system for detecting if a relay is present in a PEPS system for a vehicle is provided by (a) determining whether movement of an authentication device was detected within a predefined time period after the authentication device enters a PEPS entry operational region; and (b) determining if the authentication device was stationary for a predetermined time period during a PEPS entry triggering event.

ACCESS CONTROL SYSTEM AND METHOD
20220408263 · 2022-12-22 · ·

There is described a system and method for implementing access control using a mobile device configured to generate access requests. The method may comprise detecting a status change of the mobile device, upon detecting a status change of the mobile device, triggering logic on the mobile device into a state to monitor for receipt of one or more access control beacons, receiving an access control beacon from an access control device, generating an access request based on the received access control beacon and transmitting the access request over a wireless communication interface of the mobile device.

ACCESS CONTROL SYSTEM AND METHOD
20220408263 · 2022-12-22 · ·

There is described a system and method for implementing access control using a mobile device configured to generate access requests. The method may comprise detecting a status change of the mobile device, upon detecting a status change of the mobile device, triggering logic on the mobile device into a state to monitor for receipt of one or more access control beacons, receiving an access control beacon from an access control device, generating an access request based on the received access control beacon and transmitting the access request over a wireless communication interface of the mobile device.

On-demand security for network resources or nodes, such as for a wireless 5G network

The disclosed embodiments include a method performed by a network access node to thwart unauthorized activity on a network such as a 5G wireless network. For example, the method can include employing contextual information to determine risk to the 5G wireless network. A network access node can detect that a wireless device seeks to perform unauthorized activity, and then implements security measures such that the unauthorized activity is thwarted at the network access node.

On-demand security for network resources or nodes, such as for a wireless 5G network

The disclosed embodiments include a method performed by a network access node to thwart unauthorized activity on a network such as a 5G wireless network. For example, the method can include employing contextual information to determine risk to the 5G wireless network. A network access node can detect that a wireless device seeks to perform unauthorized activity, and then implements security measures such that the unauthorized activity is thwarted at the network access node.