H04W12/108

SYSTEMS AND METHODS FOR SECURING NETWORK FUNCTION SUBSCRIBE NOTIFICATION PROCESS
20220353263 · 2022-11-03 ·

A network device receives, from a requester, an access token request associated with subscribing a consumer network function (NF) to a resource provided by a producer NF, where the access token request includes a notification identifier identifying where the consumer NF is to receive content and/or notifications, associated with the resource, from the producer NF. The network device validates the requester and generates an access token and an access token response based on successfully validating the requester. The network device signs the notification identifier as a component of the access token response and sends the access token response, with the signed notification identifier, to the requester for use in requesting a subscription to the resource for the consumer NF from the producer NF.

PROCESSING OF ACCIDENT REPORT
20230031358 · 2023-02-02 · ·

An example operation may include one or more of receiving, by an accident processing node, an accident report from a transport, determining, by an accident processing node, a time and location parameters of the accident based on the report, querying, by an accident processing node, transport profiles on a storage based on the time and location parameters, and responsive to the transport profiles containing data corresponding to the time and location parameters, sending a request to access the transport profiles.

VERIFIED HOSTED INFORMATION IN ONLINE GALLERIES

An apparatus verifies hosted information associated with a user. The apparatus establishes, by the online host serving as a relying party system (RPS), a secure connection between the RPS and a user mobile-identification-credential device (UMD). The RPS sends a mobile identification credential (MIC) user information request to the UMD, via the secure connection, seeking release of MIC user information (official information). The RPS obtains from authorizing party system (APS) verification of the MIC user information received in response to the MIC user information request. The RPS stores the MIC user information as hosted information pertaining to the user. The RPS designates the hosted information as base truth information representing the user.

METHOD AND APPARATUS FOR ACQUISITION OF RELIABLE TIME IN A WIRELESS NETWORK
20230032067 · 2023-02-02 ·

Accurate and reliable time is acquired by a user equipment (UE) from a base station in a wireless network. The base station may obtain the time, e.g., UTC time or a GNSS time, and ciphers at least a portion of the time before broadcasting the time. The UE determines a propagation delay between the UE and the base station based on a timing advance, known locations of the UE and the base station, or a measured round trip propagation time (RTT) between the UE and the base station. A corrected time can be determined based on the time received from the base station and the propagation delay. A digital signature included with the time broadcast by the base station increases reliability. Spoofing of the broadcast time by an attacking device may be detected by the UE based on the propagation delay being outside an expected range.

Online service providing system and application program

When a user attempts to execute a procedure for transfer or the like from an app, user authentication is first required by a PIN code or the like. When the user authentication is successful, function limitation of an IC chip is released and a mode in which a function provided by the IC chip can be used is set. The app encrypts a procedure message describing procedure content with a private key using the function of the IC chip and creates electronic signature. The electronic signature and the procedure message are transmitted to a server of an online service via an intermediate server. The server executes a procedure of transfer or the like in accordance with the content of the procedure message.

ENHANCED ENTERPRISE DATA COMMUNICATIONS WITH MOBILE DEVICES
20230031032 · 2023-02-02 ·

The present disclosure is directed to various systems and methods for enhanced outbound dialing and notifications. An originating network interface is connectible to the originating network, and receptive to a media content request from the originating network. A database stores one or more originator node records, defined at least by an originator node identity, a network node address, and a media content element. A communications session processor retrieves the media content element associated with the originator node record from the database. A terminating network interface is connectible to the terminating network, and the media content element is transmitted on to the terminating network and destined for the recipient node through the terminating network interface.

DEVICES, METHODS, AND COMPUTER PROGRAM FOR RELEASING TRANSPORTATION VEHICLE COMPONENTS, AND VEHICLE-TO-VEHICLE COMMUNICATION MODULE
20230083716 · 2023-03-16 ·

Devices, methods, and a computer program for releasing transportation vehicle components and a vehicle-to-vehicle communication module. The device for releasing a vehicle component of a transportation vehicle includes at least one interface for communication with further vehicle components of the transportation vehicle and a control module for controlling the at least one interface to receive messages from the further vehicle components of the transportation vehicle and to verify the identity of the further vehicle components based on the received messages and the stored identification data of the further vehicle components. The messages on which the verification of the identity of the further vehicle components is based are messages used in regular operation of the vehicle component. The control module also releases the vehicle component in response to the identity of the further transportation vehicle components being consistent with the stored identification data of the further vehicle components.

Secure tokens for controlling access to a resource in a resource distribution network

A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a time-based token based on a time duration specified for a meter. The time-based token indicates the time duration for the meter. The time-based token is further generated based on an identifier of the meter. The headend system transmits the time-based token to the meter via at least a mesh network. After receiving the time-based token, the meter validates the time-based token to determine that the time-based token is generated for the meter based on information related to the identifier of the meter. If the meter determines that the time-based token is valid, the meter connects premises associated with the meter to a resource distribution network for at least the time duration specified in the time-based token.

SELECTIVE NETWORK ACCESS BASED ON TRUST LEVEL

This disclosure describes techniques for enabling selective connections between user devices and trusted network devices. An example method includes receiving a beacon from a network device. The beacon includes a trust level of the network device. The method further includes determining that the trust level of the network device satisfies a predetermined trust criterion. Based on determining that the trust level of the network device satisfies the predetermined trust criterion, the method includes transmitting a connection request to the network device. Further, user data is received from the network device.

DEVICE AUTHENTICATION VIA HIGH-ENTROPY TOKEN
20230085137 · 2023-03-16 ·

Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a communicating device via a communications network. One embodiment may include obtaining, at the communicating device, signals representative of one or more high-entropy tokens via the communications network, the one or more high-entropy tokens including one or more component tokens. The method may additionally include encrypting one or more parameters utilizing a first encryption key derived from at least one component token of the one or more component tokens and transmitting, via the communications network, one or more signals representative of the encrypted one or more parameters. The method may further include obtaining, at the communicating device, one or more signals indicating an outcome of a comparison between the one or more encrypted parameters with one or more similar parameters encrypted by an identity verifier.