H04W12/61

FUNCTIONALITY TO IMPROVE EXTENDER ONBOARDING PRIOR TO COUNTRY CODE DETERMINATION
20230224711 · 2023-07-13 ·

A client device for use with a wireless network controller device, a connected wireless APD and a second wireless APD, the client device including: a memory; and a processor configured to execute instructions stored on the memory to cause the client device to: associate with the wireless network; and transmit an onboard new APD instruction to the wireless network controller device to cause the wireless network controller device to: transmit a restricted mode instruction to instruct the connected wireless APD and to instruct the connected wireless APD to transmit a beacon; receive a notification of the probe request; transmit the onboarding instruction to instruct the connected wireless APD; and transmit the primary mode instruction to instruct the connected wireless APD, wherein the onboarding instruction causes one of: the connected wireless APD to transmit the beacon; and the connected wireless APD to not transmit the beacon only on the assigned channel.

Remote User Device Deauthentication
20230224708 · 2023-07-13 ·

Embodiments of the present disclosure are directed to systems and methods for remote deauthentication of electronic devices. A virtual authentication session manager or an electronic device maintains authentication across multiple electronic devices. The virtual authentication session manager receives authentication requests from electronic devices and generates a unique ID and a readable name for each device. A user can remotely deauthenticate any of the electronic devices that have previously been authenticated.

Remote User Device Deauthentication
20230224708 · 2023-07-13 ·

Embodiments of the present disclosure are directed to systems and methods for remote deauthentication of electronic devices. A virtual authentication session manager or an electronic device maintains authentication across multiple electronic devices. The virtual authentication session manager receives authentication requests from electronic devices and generates a unique ID and a readable name for each device. A user can remotely deauthenticate any of the electronic devices that have previously been authenticated.

Utilizing a High Generation Cellular Network to Authorize an Event
20230217247 · 2023-07-06 ·

Aspects of the disclosure relate to authorizing an event by utilizing a high generation cellular network to authenticate a device associated with the event. A computing platform may receive, from a first device, a request to authorize an event. Subsequently, the computing platform may identify, based on an analysis of location data, that a second device is proximate to the first device. The computing platform may then prompt the second device to authenticate the first device. Then, the computing platform may receive, from the second device, an authentication token indicating whether the first device is authenticated. Based on the authentication token, the computing platform may respond to the request to authorize the event.

PERMISSION NEGOTIATION METHOD AND APPARATUS DURING COMMUNICATION, AND ELECTRONIC DEVICE
20230214532 · 2023-07-06 ·

Embodiments of this application provide example permission negotiation methods and apparatuses during communication, and electronic devices. An example first electronic device displays an interface of a currently running communication application, and obtains, in response to the first operation, a permission item restricted for use in a process of communication with a second electronic device. Then, the first electronic device sends a first request to the second electronic device that includes the permission item restricted for use. The first electronic device receives confirmation information of the second electronic device for the permission item restricted for use, and restricts, based on the confirmation information, a locally installed application on applying for the permission item restricted for use. After communication with the second electronic device ends, the first electronic device restores settings of the permission item of the locally installed application to settings preceding the communication with the second electronic device.

COMMUNICATION CONTROL DEVICE, VEHICLE INCLUDING THE SAME, AND COMMUNICATION CONTROL METHOD

A polling processing unit executes a polling process for detecting a device that performs NFC communication. An NFC communication processing unit executes a communication process of performing NFC communication with a mobile device detected by the polling process. Power consumption associated with execution of the communication process is larger than power consumption associated with execution of the polling process. When authentication of the mobile device by an authentication processing unit is completed, or when the execution of the communication process continues for a prescribed time period, the NFC communication processing unit executes a stop process of stopping the communication process until the execution of the communication process is permitted.

Systems and mechanism to control the lifetime of an access token dynamically based on access token use
11550895 · 2023-01-10 · ·

A data management system manages secured data for a plurality of users. The data management system utilizes an access authorization system to authenticate users seeking access to the data management system. The access authorization system provides access tokens to authenticated users. The access tokens enable the authenticated users to access the data management system without again providing authentication data. The access authorization system includes, for each user, an access policy that governs whether the users can use the access tokens to access the data management system. The access tokens have a finite lifetime. If the users use the access tokens within the finite lifetime and if the users satisfy all of the access rules of the access policies, then the lifetime of the access tokens can be extended a finite number of times.

Systems and mechanism to control the lifetime of an access token dynamically based on access token use
11550895 · 2023-01-10 · ·

A data management system manages secured data for a plurality of users. The data management system utilizes an access authorization system to authenticate users seeking access to the data management system. The access authorization system provides access tokens to authenticated users. The access tokens enable the authenticated users to access the data management system without again providing authentication data. The access authorization system includes, for each user, an access policy that governs whether the users can use the access tokens to access the data management system. The access tokens have a finite lifetime. If the users use the access tokens within the finite lifetime and if the users satisfy all of the access rules of the access policies, then the lifetime of the access tokens can be extended a finite number of times.

Communication device, communication method, and communication system

A communication device is a communication device connected to a mobility network which is a network mounted in a mobility and which is used by a plurality of electronic control devices for communication. The communication device includes: a holding unit which holds range information indicating a transferable path range determined for a message on the mobility network; a receiving unit which receives the message on the mobility network; and a determining unit which determines validity of the received message by using the range information.

FAULT TRIAGE AND MANAGEMENT WITH RESTRICTED THIRD-PARTY ACCESS TO A TENANT NETWORK

The present technology is directed to providing fault management with dynamic restricted access in a tenant network. The tenant network can be a private 5G cellular network or other wireless communication network. The present technology can identify a fault event within the tenant network based on received telemetry data, associate the fault event with a vendor component included in the tenant network, and generate a vendor fault context. The vendor fault context can be generated to include only the portion of telemetry data that is determined to be related to the fault event or the vendor component. The present technology can further use the vendor fault context to create a time-bound user account for remotely accessing the tenant network for fault triage and management. The time-bound user account can be associated to a static role-based access control (RBAC) scheme configured with access restrictions determined based on the vendor fault context.