Patent classifications
H04W12/48
PERSONALIZATION ON MULTI-SUBSCRIBER IDENTIFICATION MODULE DEVICES
Methods, systems, and devices for wireless communications are described. An example method may include identifying that a user equipment (UE) includes a first subscriber identification module (SIM) card in a first card slot of a plurality of card slots of the UE is associated with a first operator and associated with a first subscription for which use of the UE is subject to a contractual obligation to the first operator. The method may further include determining that the UE is in communication with a first radio access network of the first operator and communicating in accordance with a second subscription associated with a second SIM card in a second card slot, the communicating allowed based at least in part on the first SIM card associated with the first operator being in the first card slot and the UE being in communication with the first radio access network.
MULTI-FACTOR AUTONOMOUS SIM LOCK
Aspects of the subject disclosure may include, for example, initializing a secure timer in a wireless device, determining whether a subscriber identification module (SIM) card installed in the wireless device comprises a carrier identity that matches a carrier identity stored in the machine-readable medium, establishing a network connection with a trusted server, starting the secure timer if the SIM card and network connection are satisfactory, periodically checking the network connection and SIM card until expiry of the secure timer, penalizing the secure timer responsive to a failure of the network connection or SIM card check, and responsive to expiry of the secure timer, unlocking a SIM lock. Other embodiments are disclosed.
Technologies for controlling memory access transactions received from one or more I/O devices
Technologies for secure I/O include a compute device, which further includes a processor, a memory, a trusted execution environment (TEE), one or more input/output (I/O) devices, and an I/O subsystem. The I/O subsystem includes a device memory access table (DMAT) programmed by the TEE to establish bindings between the TEE and one or more I/O devices that the TEE trusts and a memory ownership table (MOT) programmed by the TEE when a memory page is allocated to the TEE.
METHODS, SYSTEMS, APPARATUS, AND DEVICES FOR CONTROLLING ACCESS TO ACCESS CONTROL LOCATIONS
A method for controlling access to a restricted resource is provided. The method may include receiving, by a cloud server, identifiers from a user device over a long range wireless channel. Further, the method may include comparing the identifiers with a plurality of identifiers registered with access control devices. A system of control access with mobile and keycard access is also provided with long distance wireless communications between the cloud server and access control devices where the information can be remotely and wirelessly updated in each access control device independantly.
Further, the method may include authenticating the user device based on the comparing and subsequently transmitting a code to the user device upon successful authenticating. Thereafter, the user device may transmit the code to the access control device over a short range wireless channel. Further, the access control device may be configured to provide access to the restricted resource based on receiving of the code. Further, the method may include transmitting the code to the access control device over a long range wireless channel so that the access control device may authenticate the user device.
METHODS, SYSTEMS, APPARATUS, AND DEVICES FOR CONTROLLING ACCESS TO ACCESS CONTROL LOCATIONS
A method for controlling access to a restricted resource is provided. The method may include receiving, by a cloud server, identifiers from a user device over a long range wireless channel. Further, the method may include comparing the identifiers with a plurality of identifiers registered with access control devices. A system of control access with mobile and keycard access is also provided with long distance wireless communications between the cloud server and access control devices where the information can be remotely and wirelessly updated in each access control device independantly.
Further, the method may include authenticating the user device based on the comparing and subsequently transmitting a code to the user device upon successful authenticating. Thereafter, the user device may transmit the code to the access control device over a short range wireless channel. Further, the access control device may be configured to provide access to the restricted resource based on receiving of the code. Further, the method may include transmitting the code to the access control device over a long range wireless channel so that the access control device may authenticate the user device.
Method and apparatus for providing service to edge application server (eas) in edge data network (EDN)
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Accordingly, embodiments herein disclose a method for providing service(s) to an edge application server (EAS) in an edge data network (EDN). The method includes receiving, by an EES, an EAS usage indication from an edge enabler client (EEC) of a user equipment (UE), where the EAS usage indication comprises at least one parameter.
Method and apparatus for providing service to edge application server (eas) in edge data network (EDN)
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Accordingly, embodiments herein disclose a method for providing service(s) to an edge application server (EAS) in an edge data network (EDN). The method includes receiving, by an EES, an EAS usage indication from an edge enabler client (EEC) of a user equipment (UE), where the EAS usage indication comprises at least one parameter.
METHOD FOR TOKEN-BASED AUTHORIZATION FOR INDIRECT COMMUNICATION BETWEEN NETWORK FUNCTIONS
A method performed by a first network node having a network repository function. The method comprises: receiving an authorization token request from a service communication proxy, SCP; determining whether or not a network function, NF, service consumer device allows the SCP to represent the NF service consumer device; and responsive to determining that the NF service consumer device allows the SCP to represent the NF service consumer device, transmitting an authorization token to the SCP. A further method, network nodes, computer program and a non-transitory storage medium are also disclosed.
METHOD FOR TOKEN-BASED AUTHORIZATION FOR INDIRECT COMMUNICATION BETWEEN NETWORK FUNCTIONS
A method performed by a first network node having a network repository function. The method comprises: receiving an authorization token request from a service communication proxy, SCP; determining whether or not a network function, NF, service consumer device allows the SCP to represent the NF service consumer device; and responsive to determining that the NF service consumer device allows the SCP to represent the NF service consumer device, transmitting an authorization token to the SCP. A further method, network nodes, computer program and a non-transitory storage medium are also disclosed.
SYSTEMS AND METHODS FOR PERMITTING ACCESS TO A PARTY USING A DECENTRALIZED IDENTITY
Methods and systems are provided for controlling access to communications with a party using a decentralized identity. A device may receive biometric information of a user, and retrieve, using the biometric information of the user, a first communication address associated with the user. The device may transmit, via the first communication address, a request to communicate with the user; and may receive, from a second device associated with the user, an identification of a second communication address controlled by the user. The device may utilize the second communication address to transmit at least one item of information to the second device associated with the user.