Patent classifications
H04W12/66
System and method for redirecting data access to local trust managers via an indirection logic service
A method for managing data includes obtaining, by an indirection logic service, a data request for data, wherein the data request specifies a ledger entry, identifying an indirection logic entry stored in the indirection logic service based on the ledger entry, obtaining a selection of trust data from a client, wherein the ledger entry comprises metadata of the trust data, and initiating communication between the client and a local trust manager based on the selection of trust data, wherein the trust data was generated by the local trust manager.
TRANSMITTING A COMPLEMENT OF USER PARAMETERS TO A COMMUNICATIONS DEVICE
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, using one or more computing devices to obtain, from a communications device, an identifier of the communications device transmitted via a communications network. The communications network may transmit a request for one or more parameters unique to a subscriber of the communications network. The method may also include processing signals indicative of the requested one or more parameters in response to the subscriber entering the one or more parameters into a graphical user interface of the communications device. The method may further include transmitting, to the communications device, one or more signals to provide a complement of subscriber parameters.
METHODS AND SYSTEMS FOR 5G SLICING BASED ON DYNAMIC SECURITY PROPERTIES
Systems and methods enable the provisioning of security as a service for network slices. A network device stores definitions of multiple security assurance levels for network slices based on security parameters of assets used in the network slices. The network device stores multiple network slice templates, wherein the multiple network slice templates have different security assurance levels, of the multiple security assurance levels, for a Network Service Descriptor (NSD). The network device receives a request for a network slice with a requested security assurance level, of the multiple security assurance levels, for the NSD, and deploys the network slice using one of the network slice templates that has a security assurance level that corresponds to the requested security assurance level. The network device monitors the security parameters of the assets of the network slice for changes to the security assurance level of the deployed network slice.
Cellular systems having elements modified to transform and/or operate cellular communication signals in accordance with novel cellular communications protocols and network architectures utilizing cellular network hosted access controlling schemas, and methods for use thereof
In some embodiments, the present disclosure is directed to an exemplary process including: receiving, by a processor of a computing device, via an application program and a communications network, application program instruction to display an access controller interface element and an access code on a screen; where the access controller interface element is communicatively coupled to a cellular network hosted access controlling schema and operationally linked to an access-restricted digital resource; transmitting, by the processor, an access request having data that includes the access code and an identity linked to the computing device; where at least one part of the data is configured to be accepted by the cellular network hosted access controlling schema; receiving, by the processor, access program instruction to unlock the access-restricted digital resource; and executing, by the processor, the access program instruction to unlock the access-restricted digital resource for accessing via the computing device.
SYSTEM AND METHOD FOR SECURE AUTHENTICATION AND AUTHORIZATION
A system and method for secure authentication and authorization between a user device and an Internet of Things (IoT) device that is associated with an asset. The method includes onboarding, using one or more processors that are operatively associated with a distributed ledger, the user device at least based on a public key identity of the user device; onboarding a user with the user device; onboarding an identity of the IoT device and the asset such that association between the asset and the IoT device is endorsed on the distributed ledger; and facilitating the user device to retrieve a first set of data packets representative of any of a relevant electronic authoritative document(s), associated consensus proof(s), and block header(s) from the distributed ledger.
System and method for secure authentication and authorization
A system and method for secure authentication and authorization between a user device and an Internet of Things (IoT) device that is associated with an asset. The method includes onboarding, using one or more processors that are operatively associated with a distributed ledger, the user device at least based on a public key identity of the user device; onboarding a user with the user device; onboarding an identity of the IoT device and the asset such that association between the asset and the IoT device is endorsed on the distributed ledger; and facilitating the user device to retrieve a first set of data packets representative of any of a relevant electronic authoritative document(s), associated consensus proof(s), and block header(s) from the distributed ledger.
SIGNALING TECHNIQUES FOR SENSOR FUSION SYSTEMS
This disclosure provides methods, devices and systems for a vehicle user equipment (VUE) to obtain extrinsic information about an object or location. The VUE may transmit a request for information about the object or the location to a road side unit (RSU). The RSU may receive the request and determine a set of extrinsic information for the first UE regarding the object or the location based on a set of information from one or more other UEs. The extrinsic information includes information that is not provided by the VUE. The RSU may transmit the set of extrinsic information to the VUE. The VUE may determine whether to accept a feature of the object or the location in the extrinsic information based on the set of extrinsic information and a set of intrinsic information detected by the VUE, The VUE may select an autonomous driving action based on the accepted feature.
METHOD AND APPARATUS FOR GUARANTEEING TRUST OF PACKET IN DISTRIBUTED COMMUNICATION SYSTEM
An operation method of a first communication node in a wireless distributed communication system may comprise: providing a group code and a primary secret key to a third communication node via a second communication node; receiving, from the third communication node, a first packet including a first group trust field through wireless distributed communication, the first group trust field being generated using the group code and the primary secret key; and performing a trustworthiness check of the received first packet by using the first group trust field included in the received first packet, the group code, and the primary secret key.
MULTI-ALERT SECURITY MESSAGING SYSTEM
A method disclosing a multi-alert security messaging system is disclosed. The method includes receiving, by a computing system, an authorization request message from a user equipment (UE), the authorization request message including a set of identification credentials, wherein the identification credentials identify a user, a device, and a location. The method includes performing, by the computing system, a validation process via one or more databases, to determine if the identification credentials are valid, and meet an authorization clearance level. The method includes sending, via the computing system an in-session indication, to a host device. The method includes monitoring at the host device an alert trigger from the UE, based on one or more priority values. The method includes sending at least one alert message from the UE, associated with one or more alert triggers to the host device. The method includes alerting a second device of the one or more alert triggers received from the UE.
SYSTEMS AND METHODS OF EXECUTING A CHAIN OF TRUST WITH AN EMBEDDED CONTROLLER TO SECURE FUNCTIONALITIES OF AN INTEGRATED SUBSCRIBER IDENTIFICATION MODULE (ISIM)
A method of securing functionalities of an integrated subscriber identification module (iSIM) on an information handling system may include with an embedded controller (EC), detecting a powering-up process at the information handling system and determine a chain of trust access keys during bootup; with the execution of the EC, detecting and activating a wireless wide area network (WWAN) module; with the execution of the EC, detecting and accessing an integrated subscriber identity module (iSIM); with the execution of the EC, authenticating access to iSIM content including authorization information and carrier profile information with the chain of trust access keys generated from encryption keys based on digital signatures; and sending the authorization information and carrier profile information form the iSIM to the WWAN module for authentication, wirelessly, with a switched multimegabit data service (SM-DS) server associated with the carrier profile.