Patent classifications
H04W12/66
IDENTIFYING NETWORK RISK
Embodiments are disclosed for a method for identifying network risk. The method includes determining that a computing device has created a new connection to a network. Additionally, the method includes determining the public internet protocol (public IP) address of the exit point used by the network. Further, the method includes determining a reputation rating of the network based on the public IP address of the exit point. The method also includes providing a notification indicating the reputation rating of the network.
DEVICE FOR WIRELESS COMMUNICATION WITH OTHER DEVICES
A device (110) arranged for wireless communication (130) according to a communication protocol has a processor (112) to execute a connection sequence according to a discovery protocol. The connection sequence comprises determining a current cluster identity and a current discovery window timing used by the device. Next, at least one other device (120,120′) within wireless range is detected, while further determining a detected cluster identity and a detected discovery window timing of the detected other device. Then it is detected whether the detected device is operating in a different cluster than the device by comparing the current cluster identity with the detected cluster identity or comparing the current discovery window timing with the detected discovery window timing. Finally, upon detecting said different cluster, a security process is executed, which may warn the user or abort the connection sequence. Thereby, a malicious device trying to manipulate the connection sequence is detected.
Managing Access Based on Activities of Entities
Concepts and technologies are disclosed herein for managing access based on activities of entities. A computing device can collect data that comprises an image. The computing device can identify an entity that is located in a range of a sensor. The computing device can determine an identity that is associated with the entity and an activity associated with the entity. The computing device can obtain a trust indicator associated with the entity. The computing device can determine, based on the trust indicator, if the activity should be allowed. If the computing device determines that the activity should be allowed, the computing device can initiate allowing of the activity. If the computing device determines that the activity should not be allowed, the computing device can initiate blocking of the activity.
RECEIVER DEVICE FOR FACILITATING WIRELESS POWER RECEPTION
Disclosed is a receiver device for facilitating wireless power reception. The receiver device comprises a receiver transceiver configured for wirelessly communicating with at least one transmitter device. The receiver transceiver is configured for transmitting a registration request to the at least one transmitter device, wherein the registration request comprises a unique receiver device identifier, wherein the at least one transmitter device is configured for accessing a distributed block-chain associated with wireless power transfer. Further, the at least one transmitter device is configured for analyzing the registration request, updating the distributed block-chain based on the analyzing of the registration request and transmitting a registration response to the receiver device, wherein the receiver transceiver is configured for receiving the registration response.
MULTI-LINK WIRELESS COMMUNICATIONS CONNECTIONS
A method may include establishing a multi-link security association between a transmitter upper media access control (MAC) logic entity of a transmitter and a receiver upper MAC logic entity of a receiver. The transmitter may include one or more transmitter links. The receiver may include one or more receiver links.
Trusted client security factor-based authorizations
Trusted client security factor-based authorizations. The techniques allow a server to authorize client requested operations to access a protected resource or service based on trusted client security factors that are obtained at client machines and provided to the server.
SMS FRAUD DETECTION
A method for SMS fraud detection can begin at an SMS gateway and include receiving a message for transmittal via SMS for a recipient; assigning a fraud score to the message; appending, to the message, a trust indicator based on the fraud score; and sending the message with the trust indicator to the recipient via SMS. Assigning a fraud score can include checking a link included in the message and/or checking content in the message itself, and then calculating a fraud score based on the link and/or content of the message.
FRICTIONLESS FRAUD IDENTIFICATION AND TRACKING
A user is identified within an establishment. An identity associated with an account of the user with the establishment is determined. Various transactions of the user are monitored. Moreover, actions and behaviors of the user are monitored through video. A current perceived state of the user is calculated based on the monitoring of the various transactions, actions, and behaviors. The state is compared to a threshold value and a response action is automatically processed based on one or more rules. In an embodiment, custom logs are retained for a period of time that the user was in the establishment and custom aggregations of the logs are sent to one or more external systems.
Multi-factor autonomous SIM lock
Aspects of the subject disclosure may include, for example, initializing a secure timer in a wireless device, determining whether a subscriber identification module (SIM) card installed in the wireless device comprises a carrier identity that matches a carrier identity stored in the machine-readable medium, establishing a network connection with a trusted server, starting the secure timer if the SIM card and network connection are satisfactory, periodically checking the network connection and SIM card until expiry of the secure timer, penalizing the secure timer responsive to a failure of the network connection or SIM card check, and responsive to expiry of the secure timer, unlocking a SIM lock. Other embodiments are disclosed.
PATHLOSS DROP TRUSTED AGENT MISBEHAVIOR DETECTION
V2X trusted agents provide technical solutions for technical problems facing falsely reported locations of connected vehicles within V2X systems. These trusted agents (e.g., trusted members) may be used to detect an abrupt physical attenuation of a wireless signal and determine whether the attenuation was caused by signal occlusion caused by the presence of an untrusted vehicle or other untrusted object. When the untrusted vehicle is sending a message received by trusted agents, these temporary occlusions allow trusted members to collaboratively estimate the positions of untrusted vehicles in the shared network, and to detect misbehavior by associating the untrusted vehicle with reported positions. Trusted agents may also be used to pinpoint specific mobile targets. Information about one or more untrusted vehicles may be aggregated and distributed as a service.