H04W12/37

SECURITY MANAGEMENT ON A MOBILE DEVICE
20230239694 · 2023-07-27 · ·

Example mobile devices disclosed herein include a camera, memory including computer-executable instructions, and a processor to execute the instructions to at least associate a location of the mobile device with picture data obtained with the camera. The processor is also to assign a first data tag to the picture data when the location of the mobile device corresponds to a first area, the first data tag to identify a first security level for the picture data, or assign a second data tag to the picture data when the location of the mobile device does not correspond to the first area, the second data tag to identify a second security level for the picture data. The processor is further to determine whether to permit an application to access the picture data based on whether the first data tag or the second data tag is assigned to the picture data.

METHODS, ARCHITECTURES, APPARATUSES AND SYSTEMS DIRECTED TO MESSAGING THROUGH BLOCKCHAIN NETWORKS
20230239264 · 2023-07-27 ·

Procedures, methods, architectures, apparatuses, systems, devices, and computer program products directed to messaging through blockchain networks are provided. Among such methods is a method that may be implemented in a device comprising circuitry, including a transmitter, a receiver and a processor, and may include any of receiving a request to send a message including a message and information indicating a source of the message, a destination of the message and a distributed ledger system; determining a first node associated with a distributed ledger system based, at least in part, the information indicating the distributed ledger system and the information indicating the destination; generating a transaction for the message; and sending the transaction to a second node of the distributed ledger system.

Communication Method and Communications Apparatus
20230007472 · 2023-01-05 ·

A communication method and a communications apparatus, where the method includes: after receiving an RRC resume request message from a UE, determining, by a target access network device, a first user plane security protection method between the target access network device and the UE based on a context information obtaining response from a source access network device; determining a first user plane security key between the target access network device and the UE; when receiving first uplink user plane data from the UE, performing user plane security deprotection on the first uplink user plane data based on the first user plane security key and the first user plane security protection method, to obtain uplink user plane data; and sending the uplink user plane data.

Pillar location for a mobile device

Techniques for pillar location for a mobile device are described, and may be implemented via a mobile device to identify frequently visited locations and to perform different tasks for the mobile device at the frequented locations. Generally, the described techniques enable a mobile device to generate precise representations of frequented locations known as “pillar locations” without relying on conventional location determination techniques. Further, specific actions can be performed when the mobile device is detected at a pillar location, such as automatically unlocking the mobile device from a locked state.

Pillar location for a mobile device

Techniques for pillar location for a mobile device are described, and may be implemented via a mobile device to identify frequently visited locations and to perform different tasks for the mobile device at the frequented locations. Generally, the described techniques enable a mobile device to generate precise representations of frequented locations known as “pillar locations” without relying on conventional location determination techniques. Further, specific actions can be performed when the mobile device is detected at a pillar location, such as automatically unlocking the mobile device from a locked state.

Certificate based profile confirmation
RE049585 · 2023-07-18 · ·

Disclosed are various embodiments for controlling access to resources in a network environment. Methods may include installing a profile on the device and installing a certificate included in or otherwise associated with the profile on the device. A request to execute an application, and/or access a resource using a particular application, is received and determination is made as to whether the certificate is installed on the device based on an identification of the certificate by the application. If the certificate is installed on the device, then execution of the application and/or access to the resource is allowed. If the certificate is not installed on the device, then the request for execution and/or access is refused.

Certificate based profile confirmation
RE049585 · 2023-07-18 · ·

Disclosed are various embodiments for controlling access to resources in a network environment. Methods may include installing a profile on the device and installing a certificate included in or otherwise associated with the profile on the device. A request to execute an application, and/or access a resource using a particular application, is received and determination is made as to whether the certificate is installed on the device based on an identification of the certificate by the application. If the certificate is installed on the device, then execution of the application and/or access to the resource is allowed. If the certificate is not installed on the device, then the request for execution and/or access is refused.

MOBILE DEVICE WITH SECURE PRIVATE MEMORY

A mobile device can detect an idle state and, in response, initiate an access monitoring function to covertly monitor activity involving a human interaction with the mobile device. The covert monitoring is undetectable by a user of the mobile device. The mobile device can then detect a human interaction with the mobile device and, in response, cause the mobile device to covertly capture and log one or more human interactions with the mobile device. An authorized user of the mobile device is enabled to review the log of human interactions with the mobile device.

MOBILE DEVICE WITH SECURE PRIVATE MEMORY

A mobile device can detect an idle state and, in response, initiate an access monitoring function to covertly monitor activity involving a human interaction with the mobile device. The covert monitoring is undetectable by a user of the mobile device. The mobile device can then detect a human interaction with the mobile device and, in response, cause the mobile device to covertly capture and log one or more human interactions with the mobile device. An authorized user of the mobile device is enabled to review the log of human interactions with the mobile device.

Communication method in vehicle to everything, user equipment, and network device

A communication method in a vehicle to everything (V2X), user equipment (UE), and a network device can achieve a correct communication between UE and UE on a PC5 interface. The method includes: receiving, by the UE, first information transmitted by the network device, the first information being configured to instruct a radio access technology (RAT) authorized to be used by the UE on the PC5 interface.