Patent classifications
H04W12/37
Identity information controlled financial account device
A processing unit and a mobile identity information controlled financial account device may communicate. The processing unit receives at least one digital representation of a biometric, obtains identity information using the at least one digital representation of the biometric, and determines whether or not to transmit an authorization signal to the mobile identity information controlled financial account device that enables use of the mobile identity information controlled financial account device in at least one transaction involving at least one financial account. The mobile identity information controlled financial account device may be usable for the at least one transaction when the mobile identity information controlled financial account device receives the authorization signal. The processing unit may also receive a first digital representation of a biometric for a first person along with at least one permission to assign regarding the mobile identity information controlled financial account device for a second person.
Identity information controlled financial account device
A processing unit and a mobile identity information controlled financial account device may communicate. The processing unit receives at least one digital representation of a biometric, obtains identity information using the at least one digital representation of the biometric, and determines whether or not to transmit an authorization signal to the mobile identity information controlled financial account device that enables use of the mobile identity information controlled financial account device in at least one transaction involving at least one financial account. The mobile identity information controlled financial account device may be usable for the at least one transaction when the mobile identity information controlled financial account device receives the authorization signal. The processing unit may also receive a first digital representation of a biometric for a first person along with at least one permission to assign regarding the mobile identity information controlled financial account device for a second person.
Method and apparatus for base station self-configuration
Disclosed is method and an evolved NodeB (eNB) for use in a Long Term Evolution (LTE) network including establishing an X2 interface between the eNB and another eNB and communicating information between the eNB and the another eNB via the X2 interface.
System, method and computer program product for secure Bluetooth cryptography in a virtual mobile device platform
Embodiments are disclosed that allow encrypted data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, a Bluetooth implementation on the physical device may include one or more raw interfaces to facilitate endpoint to endpoint secure Bluetooth cryptography. Using these raw interfaces, an encrypted Bluetooth channel may be established directly between the virtual device and the Bluetooth enabled device using the radio of the physical device, where data may be encrypted and decrypted at an endpoint of the Bluetooth communication channel (such as at the virtual device or the Bluetooth enabled device) and passed through a Bluetooth implementation on the physical device without any additional encryption or decryption being performed on that data.
System, method and computer program product for secure Bluetooth cryptography in a virtual mobile device platform
Embodiments are disclosed that allow encrypted data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, a Bluetooth implementation on the physical device may include one or more raw interfaces to facilitate endpoint to endpoint secure Bluetooth cryptography. Using these raw interfaces, an encrypted Bluetooth channel may be established directly between the virtual device and the Bluetooth enabled device using the radio of the physical device, where data may be encrypted and decrypted at an endpoint of the Bluetooth communication channel (such as at the virtual device or the Bluetooth enabled device) and passed through a Bluetooth implementation on the physical device without any additional encryption or decryption being performed on that data.
Techniques to manage integrity protection
Wireless communication methods are described for a user plane integrity protection failure detection and handling, determination and management of integrity protection enabled data rate that exceeds or is close to exceeding a user equipment's capability or threshold, and management of integrity protection or encryption mechanisms in a dual-connectivity system that includes a master network node and a secondary network node.
Enhanced token transfer
Methods and systems for token transfer are described herein. A remote computing device may receive, from a mobile computing device, a public key of a public-private key pair. The public key may be associated with a first application of the mobile computing device. The first application may be configured to send credentials to a second application of the mobile computing device. The second application may be isolated from other applications executable on the mobile computing device. The remote computing device may receive, from the first application, a token. The token may have been previously issued to the first application and may have been encrypted, using the public key, by the first application. The remote computing device may send, to the second application, the token to enable the second application to authenticate with a plurality of services that interact with the second application.
Apparatus and method for providing operator specific service
Convergence of a 5.sup.th-Generation communication system supporting higher data rates beyond 4.sup.th-Generation system(s) with a technology for Internet of Things (IoT) may be applied to intelligent services. Operator specific services are permitted and provided by allowing an unauthorized terminal to search for and access the such services, and includes notifying a terminal of information corresponding to “operator specific services” by allowing a base station to broadcast predetermined information, displaying information acquired by a terminal, matching information acquired by the terminal with information broadcast from a base station to arrange services, requesting access and notifying a terminal performs an access for “operator specific services” upon accessing a network, providing a menu for determining whether neighboring base stations are capable of “operator specific services” to a user of a terminal, and allowing the terminal to determine whether there is the base station broadcasting the information.
Apparatus and method for providing operator specific service
Convergence of a 5.sup.th-Generation communication system supporting higher data rates beyond 4.sup.th-Generation system(s) with a technology for Internet of Things (IoT) may be applied to intelligent services. Operator specific services are permitted and provided by allowing an unauthorized terminal to search for and access the such services, and includes notifying a terminal of information corresponding to “operator specific services” by allowing a base station to broadcast predetermined information, displaying information acquired by a terminal, matching information acquired by the terminal with information broadcast from a base station to arrange services, requesting access and notifying a terminal performs an access for “operator specific services” upon accessing a network, providing a menu for determining whether neighboring base stations are capable of “operator specific services” to a user of a terminal, and allowing the terminal to determine whether there is the base station broadcasting the information.
SECURITY MANAGEMENT ON A MOBILE DEVICE
Example mobile devices disclosed herein include a camera, memory including computer-executable instructions, and a processor to execute the instructions to at least associate a location of the mobile device with picture data obtained with the camera. The processor is also to assign a first data tag to the picture data when the location of the mobile device corresponds to a first area, the first data tag to identify a first security level for the picture data, or assign a second data tag to the picture data when the location of the mobile device does not correspond to the first area, the second data tag to identify a second security level for the picture data. The processor is further to determine whether to permit an application to access the picture data based on whether the first data tag or the second data tag is assigned to the picture data.