H04W12/61

AUTHORIZATION AND POLICY PARAMETER CONFIGURATION METHOD, TERMINAL, AND NETWORK FUNCTION
20220400378 · 2022-12-15 · ·

An authorization and policy parameter configuration method, a terminal, and a network function are provided. The method is applied to a terminal and includes: sending terminal-to-terminal relay communication capability information and/or a terminal policy container to a first network function; and receiving an authorization and policy parameter for relay communication sent by a second network function, where the authorization and policy parameter for relay communication is generated based on the relay communication capability information and/or the terminal policy container.

ANOMALOUS USER ACTIVITY TIMING DETERMINATIONS

According to examples, an apparatus may include a processor and a memory on which is stored machine-readable instructions that when executed by the processor, may cause the processor to identify a timing at which a user activity occurred and may apply an anomaly detection model on the identified timing at which the user activity occurred, in which the anomaly detection model is to output a risk score corresponding to a deviation of the timing at which the user activity occurred from timings at which the user normally performs user activities. The processor may also determine whether the timing at which the user activity occurred is anomalous based on the risk score and, based on a determination that the timing at which the user activity occurred is anomalous, may output an alert regarding the anomalous timing of the user activity occurrence.

Method for Unlocking a Lock Using Real-Time Wireless Power Supply
20220398882 · 2022-12-15 ·

A method for unlocking the lock using real-time wireless power supply includes proceeding with authentication identification of a powerless lock by an electronic key after pairing. Power is wirelessly supplied from the electronic key to the lock when the authentication identification starts or the authentication identification passes. The lock obtains the power wirelessly supplied from the lock to operate. When the authentication identification is identified as being successful, the electronic key outputs an unlocking command to the lock. The lock receiving the unlocking command proceeds with an unlocking operation using the power supplied wirelessly.

Using keys with targeted access to the blockchain to verify and authenticate identity
11528263 · 2022-12-13 · ·

Systems and methods for accessing credentials from a blockchain are provided. A computing device requests for a server to process a transaction. In response to the request, the server transmits a server public key to the computing device. A key generator of the computing devices uses the user private key and the server public key to generate a user public key. The user public key includes permissions to access credentials that are stored on blockchain. The server receives the user public key and generates a request for credentials to blockchain. The request includes the user public key and the server private key. The blockchain receives the request and generates an identity token. The identity token includes credentials that are specified in the user public key. The blockchain transmits the identity token to the server and the server uses the identity token to processes the transaction.

Ransomware protection for cloud storage systems
11526611 · 2022-12-13 ·

Exemplary security applications and systems are described herein. Such embodiments may be configured to provide backup functionality and ransomware protection for cloud storage systems. The described embodiments may monitor cloud storage systems to detect and classify various events. And the embodiments may perform any number of actions based on classified events, such as transmitting notifications to users, preventing a user or application from accessing the cloud storage system, and/or restoring infected files.

Systems and methods for delayed-message attack mitigation
11528153 · 2022-12-13 · ·

A computer-implemented method comprising: establishing, by an operation device, a wireless communication with a remote device; authenticating, by the operation device, the wireless communication with the remote device; receiving, at the operation device, a first command to perform a first operation; establishing a first maximum delay period using an estimated time delay, wherein the estimated time delay comprises an authentication delay, an encryption delay, or a combination thereof; determining, by the operation device, that the first command is received within a first maximum delay period; performing, by the operation device, the first operation; receiving, at the operation device, a second command to perform a second operation; establishing a second maximum delay period using the estimated time delay; determining, by the operation device, that the second command is received within a second maximum delay period; and performing, by the operation device, the second operation instructed in the second command.

Utilizing a high generation cellular network to authorize an event
11523276 · 2022-12-06 · ·

Aspects of the disclosure relate to authorizing an event by utilizing a high generation cellular network to authenticate a device associated with the event. A computing platform may receive, from a first device, a request to authorize an event. Subsequently, the computing platform may identify, based on an analysis of location data, that a second device is proximate to the first device. The computing platform may then prompt the second device to authenticate the first device. Then, the computing platform may receive, from the second device, an authentication token indicating whether the first device is authenticated. Based on the authentication token, the computing platform may respond to the request to authorize the event.

Acquiring current time in a network

Exemplary of embodiments of the disclosure include a method which includes determining, by a first device, whether the first device has a current time and transmitting a request for the current time to a second device if the first device does not have the current time. The second device is in a local network. The method further includes receiving, by the first device, the current time from the second device, authenticating a certificate based on the current time received from the second device, and establishing a network connection to the local network based on the authenticated certificate.

Mobile device case for secured access and improvements
11520942 · 2022-12-06 · ·

Mobile device cases are provided which, in a first embodiment, selectively limit a user's ability to control the user's own mobile electronic device. The case includes front and rear portions joined together and defining therein an opening for receiving a mobile electronic device, such as a mobile phone. A locking mechanism is provided for selectively securing the opening in a first locked position to prevent operational access to the mobile electronic device by the user until a predetermined condition is met. The case includes an indicia of time visible to the user during the period of time of prevented operational access. In a further embodiment, a case is provided with first and second polymeric shells each having an interior and an exterior surface thereon and connected together by at least one hinge portion. The first and second shell portions form a cavity of sufficient size to cover a mobile electronic device sufficiently to prevent access by its user. Tamper resistant and ultrasonic sensor defeating mobile device case embodiments are also contemplated by this invention.

Electronic apparatus and control method thereof

An electronic apparatus is provided. The electronic apparatus includes: a communication interface comprising circuitry and a processor connected with the communication interface and configured to control the electronic apparatus, wherein the processor is configured to, based on identification information of an access point and access information including an access allowance time to the access point being received from another electronic apparatus through the communication interface, connect communication to the access point based on the identification information of the access point, and based on the access allowance time passing, release access to the access point.