Patent classifications
H04W12/43
Secure communication in accessing a network
Secure communication in accessing a network is described herein. An example apparatus can include a memory and a processor coupled to the memory. The processor can be configured to receive an identity public key from the identity device. The identity public key can be received in response to providing, to the identity device, a request to modify content of the identity device. The processor can be further configured to encrypt data corresponding to subscriber information using the identity public key, provide (to the identity device) the encrypted data to store the subscriber information in the identity device, and access a network operated by a network operator via the data stored in the identity device.
Method and apparatus for subscribing electronic device in mobile communication system
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4.sup.th-Generation (4G) communication system such as Long Term Evolution (LTE). A subscriber server supporting subscription of an electronic device in a communication system is provided. The subscriber server includes a transceiver configured to transmit and receive a signal, and a controller configured to receive a first subscription connection request message of the electronic device from a terminal, the first subscription connection request message including subscription terminal information of the terminal and identification information of the electronic device, authenticate a user of the terminal on a basis of the subscription terminal information included in the received first subscription connection request message, and transmit a second subscription connection request message of the electronic device to a support server if the user authentication has succeeded. The subscription terminal information of the terminal is used to acquire subscription information of the electronic device so as to subscribe the electronic device.
User content access management and control
User content access management and control are described, including determining, based on a user-defined rule, that a triggering event has occurred, wherein the user-defined rule is associated with an account that belongs to the user, and the user-defined rule comprises an action to be performed based on a triggering event; and performing the action based on the triggering event, wherein the action affects access to the account.
REUSING A MOBILE NETWORK OPERATOR PROFILE IN AN EMBEDDED SMART CARD
A first smart card in a first wireless communication device receives a first profile that indicates a subscription to provide wireless connectivity to a user. The first profile is a copy of at least a portion of a second profile previously established by the user and stored on a second smart card in a second wireless communication device. The first wireless communication device then establishes a first wireless connection with a network using the subscription indicated by the first profile.
Device to device security using NAF key
A method, apparatus and computer program product are disclosed for establishing secure off-network communications between first and second Secure Cellular Devices that each have a cellular identity. The second Secure Cellular Device may assume the role of Remote Device for interaction with the NAF keyserver and may obtain a local key. The first Secure Cellular Device may derive the local key and the two devices may conduct secure communications using the shared local key. The two Secure Cellular Devices may alternate the roles of Secure Host and Remote Device, each twice obtaining or deriving a shared local key such that there are two such keys. The devices may employ one key for secure communication in one direction and the other for communication in the other direction. Alternatively, the devices may derive a unique shared key as a function of the two shared keys.
METHODS AND APPARATUS FOR SIM-BASED AUTHENTICATION OF NON-SIM DEVICES
Methods and apparatus presented herein allow a non-SIM device to access a paid Wi-Fi network by having a server emulate the non-SIM device as a related SIM-enabled device to a mobile operator. The mobile operator is led to believe that the non-SIM device is the related SIM-enabled device, and thereby grants authorization to the non-SIM device to access the paid Wi-Fi network.
System and Method for Receiving and Relaying a Paging Message Via a Paging Proxy
The present invention provides a system and method for receiving and relaying a paging message via a paging proxy in a wide area wireless network. The system and method include detecting a proxy device for acting as a paging proxy near a present position of the mobile wireless communication device, where the proxy device includes a communication connection with a network paging controller, and is adapted to interact with the mobile wireless communication device separately from a wide area communication connection used by the mobile device to communicate with the wide area wireless network. The mobile wireless communication device is then associated with the proxy device for receiving and relaying an indication of paging messages on behalf of and to the mobile wireless communication device. A wireless receiver of the mobile wireless communication device used by the mobile wireless communication device to communicate with the wide area wireless network via a wide area communication connection is then deactivated. When the indication of a paging message intended for the mobile wireless communication device is to be delivered to the mobile wireless communication device having the deactivated wireless receiver, the wide area wireless network conveys the indication of the paging message via the proxy device, where the proxy device communicates the indication of the paging message via an interrupt based form of communication.
Disguising UE communications in a cellular network
A mobile device can select an identifier from a set of identifiers stored by the mobile device. The mobile device can communicate a request for a communication link with a communication system, and the request for the communication link can include the identifier. The communication link can be established based on the identifier. The mobile device can select a second identifier from the set of identifiers. The mobile device can communicate a second request for a second communication link with the communication system, and the second request can include the second identifier. The second communication link can be established based on the second identifier.
Disguising UE communications in a cellular network
A mobile device can select an identifier from a set of identifiers stored by the mobile device. The mobile device can communicate a request for a communication link with a communication system, and the request for the communication link can include the identifier. The communication link can be established based on the identifier. The mobile device can select a second identifier from the set of identifiers. The mobile device can communicate a second request for a second communication link with the communication system, and the second request can include the second identifier. The second communication link can be established based on the second identifier.
RETROSPECTIVE DISCOVERY OF SHARED CREDENTIALS
A method for identifying a shared credential within a networked computing environment. The method includes a computer processor accessing information corresponding to an aggregated plurality of authentication events within a networked computing environment. The method further includes identifying one or more credentials that are associated with the aggregated plurality of authentication events. The method further includes analyzing a frequency of usage of a first credential that is included in the identified one or more credentials. The method further includes determining that the first credential is shared, based at least in part, on the analysis of the frequency of usage of the first credential in authentication events by one or more hosts, and information related to authentication events corresponding to the one or more hosts that utilize the credential in authentication events. The method further includes generating a report that identifies that the first credential is shared.