Patent classifications
H04W12/66
Reputation-based transaction security
Reputation-based transaction security. In one embodiment, a method for reputation-based transaction security may include obtaining data regarding a user device associated with a first party; obtaining data regarding an intended second party, the user device being used in a transaction between the first party and the intended second party; calculating a reputation score based on the data obtained regarding the user device and the intended second party; determining a likelihood that resources related to the transaction will be received by the intended second party based on determining that the reputation score satisfies a pre-determined threshold; and automatically initiating a remedial action to the user device based on determining the likelihood that resources related to the transaction will be received by the intended second party.
Systems and methods for preventing system level browser attacks through mobile applications
The disclosed computer-implemented method for preventing system level browser attacks through mobile applications may include (i) intercepting a message transmitted by a mobile application, wherein the message is based on data received by the mobile application, (ii) obtaining a universal resource locator (URL) from the message, (iii) obtaining reputation data using the URL, (iv) determining that the URL is for a malicious website based on the reputation data, and (v) in response to determining that the URL is for the malicious website, performing a security action to protect the computing device from system level browser attacks. Various other methods, systems, and computer-readable media are also disclosed.
REVIEW RECORDATION AND EVALUATION SYSTEMS AND METHODS
A computer-implemented system and method for generating and displaying an authority score through a software application executed by a process or a computing device. The processor may receive visit data indicative of a user's presence and review data describing an entity at a location. The processor may determine an authority score for the review data and perform a calculation using at least a portion of the visit data as at least one input. The processor may generate and cause a visual indication of the authority score to be displayed by a display device.
METHOD AND APPARATUS FOR DETERMINING AND UTILIZING A TRUST INDICATION IN MOBILE NETWORKS
Methods and apparatus are disclosed for. A method comprises, collecting information on messages exchanged between a first mobile network and a second mobile network during a time period; and determining a trust indication of the first mobile network at least based on the collected information. The trust indication of the first mobile network indicates a level of trustworthiness of the first mobile network.
MONITORING OF DISTRIBUTED SYSTEMS
An environment of sensors and actuators is operated in accordance with predetermined policies, and the effectiveness of individual policies is monitored by comparing inputs from the sensors (550) with intended outcomes from policies controlled by previous inputs from one or more of the same sensors. Each policy includes a check function (554), wherein a sensor, other than the one that triggers the actions, monitors the actions generated by the policy and generates an output (556) indicative of whether a system state is approaching a condition specified by the policy.
Flexible security channel establishment in D2D communications
A method for securing D2D communications may comprise: encrypting communication data based at least in part on a security policy associated with at least one of a general trust evaluation and a local trust evaluation; and sending the encrypted communication data from a first user equipment to one or more second user equipments, wherein the second user equipment of which at least one of a general trust evaluation result and a local trust evaluation result satisfies the security policy set by the first user equipment is eligible to access the encrypted communication data.
Methods, Application Server, IoT Device and Media For Implementing IoT Services
The embodiments of the present disclosure provide methods, an application server, a user device and storage media for implementing trust IoT services based on a block chain. The application sewer includes a memory and a processor, the memory being stored with machine executable instructions that, when executed by the processor, cause the application server to perform operations including: determining a uniform device identifier specification for a plurality of IoT devices, wherein the plurality of IoT devices are provided by at least one provider; determining a unique identifier for each IoT device of the plurality of IoT devices, the unique identifier conforming to the uniform device identifier specification and the unique identifier being a public key in a pair of public key and private key of the IoT device; and registering the unique identifier of the IoT device with a block chain platform. With the solution of present disclosure, each IoT device may be uniformly and uniquely identified in a system including a plurality of IoT device providers.
Forwarding messages in a wireless communications network
Handling communications in a wireless network is described. A message requesting forwarding of communications for a first user device is received. Communications include telephone calls, video calls, text based communications, and messages sent via social media. The message requesting forwarding is sent in response to detecting a battery reaching or dropping below a predefined threshold power level. The location of the first user device is determined. One or more trusted second user devices associated with the first user device is identified based on a parameter indicating a highest predefined priority. A trusted second user device is selected to automatically receive redirected forwarded communications for the first user device. The selected second user device is located within a predefined distance of the location of the first user device. Forwarding is cancelled based on detection of normal battery status, or upon receiving a manual cancellation notification.
Receiver device for facilitating wireless power reception
Disclosed is a receiver device for facilitating wireless power reception, the receiver device comprising a receiver transceiver configured for wirelessly communicating with at least one transmitter device. Further, the receiver device comprising of a receiver processing device communicatively coupled to the unique receiver transceiver. Further, the receiver device comprising a enabled receiver storage device configured for storing energy for at least one blockchain enabled receiver. Moreover, the receiver device comprising a unique power port communicatively coupled with the unique receiver transceiver, wherein the unique power output port is configured to be interfaced with at least one power input port of at least one electronic device, wherein the unique power output port is configured for supplying the electrical energy to the at least one electronic device.
Fowarding messages in a wireless communications network
Systems, methods and computer program products for handling communications in a wireless network are described. A message requesting forwarding of communications for a first user device is received. A location of the first user device is determined. One or more second user devices associated with the first user device is identified. A second user device is selected to receive forwarded communications for the first user device. The selected second user device is located within a predefined distance of the location of the first user device. In example implementations, the one or more second user devices are trusted user devices.