H04W12/61

Real-time authorization of initiated data exchanges based on tokenized data having limited temporal or geographic validity

The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, authorize initiated exchanges of data based on tokenized data characterized by a limited temporal or geographic validity. For example, an apparatus may receive a first signal that includes first information identifying a first geographic position of a client device. The apparatus may also obtain a digital token representative of a pre-authorization of a data exchange between the client device and a terminal device during a corresponding temporal interval. The terminal device may, for example, be disposed within a geographic region that includes the first geographic position of the client device. The apparatus may generate and transmit a second signal that includes the digital token to the client device. In some examples, the apparatus may transmit the second signal being through a programmatic interface associated with an application program executed by the client device.

Real-time authorization of initiated data exchanges based on dynamically generated tokenized data

The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, authorize initiated exchanges of data in real-time based on dynamically generated tokenized data. For example, an apparatus may receive first positional data identifying a first geographic position of a client device and based on the first positional data, the apparatus may determine a value of a parameter characterizing an exchange of data between the client device and a terminal device disposed proximate to the client device during a temporal interval. The apparatus may transmit data requesting a pre-authorization of the data exchange to a computing system, which perform operations that pre-authorize the data exchange in accordance with the parameter value and transmit a digital token representative of the pre-authorized data exchange to the terminal device. The digital token may be valid during the temporal interval and may include a cryptogram associated with the client device.

Active base apparatus

In accordance with some embodiments, an apparatus for privacy protection is provided. The apparatus includes a housing arranged to hold a personal communication device and a peripheral interface supported by the housing, where the peripheral interface is connectable to a supplemental functional device. The apparatus further includes a local communication device coupled to the peripheral interface and supported by the housing, where the local communication device includes a personal communication device interface modem operable to provide a communication channel between the peripheral interface and the personal communication device. The apparatus further includes a controller coupled to the peripheral interface and the local communication device, where the controller is operable to manage the communication channel between the supplemental functional device and the personal communication device.

PROTECTED RESETTING OF AN IOT DEVICE
20220417749 · 2022-12-29 ·

A method reconfigures an IoT device which is connectable to a cloud backend. The method includes: storing an access code that is input locally in the cloud backend and storing the access code or check information formed on the basis thereof on the IoT device. The method further includes reconfiguring the IoT device, requesting the access code from the cloud backend, inputting the requested access code on a local configuration interface of the IoT device or on an input device connected to the local configuration interface of the IoT device, and comparing the input access code against the access code stored on the IoT device, or the check information formed on the basis thereof. The IoT device is enabled for reconfiguration upon a positive comparison of the input access code against the access code stored, or the check information formed on the basis thereof.

INFORMATION PROCESSING DEVICE AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM

An information processing device includes: a storage configured to store an electronic certificate used for authentication for using a network; a detector configured to detect whether a time to renew the electronic certificate has arrived; and a communication unit having a first communication mode in which the communication unit communicates with an external device via the network and a second communication mode in which the communication unit communicates with a certificate renewal device without using the network. The communication unit connects with the certificate renewal device in the second communication mode and receives an electronic certificate for renewing the electronic certificate from the certificate renewal device, on a basis of the detection by the detector.

PLATFORM FRAMEWORK NAMESPACES

Embodiments of systems and methods for platform framework namespaces are described. Embodiments include platform framework participants that issue requests for registration as members of namespaces supported by the platform framework. The platform framework generates an entry in a manifest in response to a participant's registration, wherein the manifest entry identifies a participant as registered within a particular namespace. The platform framework receives, from an operating system application, a request for participants registered within one or more namespaces. The platform framework provides the requesting operating system application with an identity of one or more participants that are registered within the first namespace. The requesting operating system application may then choose from registered participants that provide access to platform framework resources that are available for use within a particular namespace.

Method for handling case of detecting unauthorized frame transmitted over onboard network

An anomaly handling method using a roadside device is disclosed. The method includes receiving, from a vehicle, an anomaly detection notification, which includes level information indicating a level affecting safety, and a location of the vehicle. The method also includes obtaining a location of the roadside device and determining whether a distance between the location of the vehicle and the location of the roadside device is within a predetermined range. When the distance is within the predetermined range and is shorter than a first predetermined distance, not changing the level information and transmitting the received anomaly detection notification externally from the one vehicle. When the distance is within the predetermined range and is longer than or equal to the first predetermined distance, changing to decrement a level indicated by the level information, and transmitting changed anomaly detection notification externally from the one vehicle.

METHOD AND SYSTEM FOR CONTROLLING TRAFFIC IN PRIVATE NETWORK BASED ON MOBILE COMMUNICATION NETWORK
20220408392 · 2022-12-22 · ·

A private network system based on a mobile communication network, includes: a packet data processing system of a mobile communication core network to which a user terminal is attached; a traffic management device configured to retain an attachment policy that is set in advance; and a packet analysis device, configured to receive a packet that requests network attachment from the packet data processing system, extract attachment information of the user terminal from the packet, and compare the attachment information with the attachment policy of the traffic management device to control intranet or Internet attachment. The attachment policy includes at least one of a whitelist defining a target whose traffic is allowed or a blacklist defining a target whose traffic is blocked, and the packet data processing system is included in a private network system that is not controlled by a control policy device of the mobile communication core network.

Detection of false base stations based on signal times of arrival

Apparatus, methods, and computer-readable media for facilitating detection of false base stations based on signal times of arrival are disclosed herein. An example method for wireless communication of a UE includes receiving a signal from each of one or more neighboring base stations. The example method also includes determining a system timing associated with the wireless communications network based on a respective time of arrival at which each signal is received from the neighboring base stations. The example method also includes receiving a signal from an FBS, the FBS signal being associated with a PCI different than the PCIs associated with the signals received from each of the neighboring base stations. Additionally, the example method includes identifying a presence of the FBS based on a difference between the system timing and a time of arrival at which the signal is received from the FBS.

Detection of false base stations based on signal times of arrival

Apparatus, methods, and computer-readable media for facilitating detection of false base stations based on signal times of arrival are disclosed herein. An example method for wireless communication of a UE includes receiving a signal from each of one or more neighboring base stations. The example method also includes determining a system timing associated with the wireless communications network based on a respective time of arrival at which each signal is received from the neighboring base stations. The example method also includes receiving a signal from an FBS, the FBS signal being associated with a PCI different than the PCIs associated with the signals received from each of the neighboring base stations. Additionally, the example method includes identifying a presence of the FBS based on a difference between the system timing and a time of arrival at which the signal is received from the FBS.