H04W12/66

DYNAMIC PRIVILEGE ALLOCATION BASED ON COGNITIVE MULTIPLE-FACTOR EVALUATION

In an embodiment, a method for allocating privileges on a computer network includes calculating a permission level based at least in part on a login context associated with a login request for connection to a network from a user via a client device, adjusting the calculated permission level such that a resulting first adjusted permission level does not exceed a previous permission level assigned to the client device, assigning the first adjusted permission level to the client device, collecting activity data representative of network activity by the user while logged in to the network, and classifying, using a classifier model, at least a portion of the activity data to generate a second adjusted permission level for the client device.

Digital notary use in distributed ledger technology (DLT) for block construction and verification

A method of using a digital notary in distributed ledger technology for block construction and verification is disclosed that comprises creating, via a birth block creator server in a network, a birth block comprising electronic device information associated with an electronic device and an instruction set. The method also comprises confirming, by a digital notary server in the network, that the instruction set was built in trust and adding, by the digital notary server, a digital notary component to the birth block in response to the confirmation. The method further comprises creating a subsequent block for the electronic device that comprises the instruction set and the digital notary component, validating the subsequent block based on the digital notary component without consensus from a plurality of consensus servers in the network, and storing the subsequent block in response to the validation.

REMOTE ATTESTATION IN NETWORK
20210037042 · 2021-02-04 ·

The present disclosure relates to a remote attestation in a network. Embodiments provide a method comprising: attesting a first node in a network, by a node adjacent to the first node in the network; and generating an attestation result of the first node. A plurality of attestation results of the first node generated by a plurality of nodes adjacent to the first node in the network are combined to determine a credibility of the first node. In such embodiments, a fixed verifier for other nodes is eliminated, and a risk of a collapse due to a failure of such fixed verifier may be avoided.

System and Process for Locking a Subscriber Identity Module (SIM) Card to a Wireless Device
20210037379 · 2021-02-04 ·

The disclosure is directed to a device configured to implement a SIM lock to control network access associated with a wireless device. The device including a processor configured to interrogate a host wireless device and obtain a host wireless device identification from the host wireless device. The processor further configured to retrieve from a memory a stored wireless device identification, determine if a host wireless device identification matches the stored wireless device identification, prevent access of the host wireless device to network wireless services if the host wireless device identification does not match the stored wireless device identification, and enable access of the host wireless device to network wireless services if the host wireless device identification matches the stored wireless device identification. An associated process is also disclosed.

Receiver device for facilitating wireless energy reception

Disclosed herein is a receiver device for facilitating wireless energy reception. Accordingly, the receiver device may include a receiver transceiver. Further, the receiver transceiver may be configured for receiving energy wirelessly from at least one transmitter device. Further, the receiver transceiver may be configured for transmitting a registration request to the at least one transmitter device. Further, the registration request may include a unique receiver device identifier. Further, the at least one transmitter device may be configured for analyzing the registration request. Further, the at least one transmitter device may be configured for accessing a distributed block-chain associated with wireless energy transfer based on analyzing. Further, the at least one transmitter device may be configured for authenticating the receiver device based on the accessing. Further, the at least one transmitter device may be configured for transmitting the energy wirelessly to the receiver transceiver based on the authenticating.

Data trust score

Various implementations described herein are directed to determining a multi-factor trust score. Data from one or more endpoint devices is received over a gateway. A trust score is determined based on a plurality of metrics. The plurality of metrics including at least: a first attestation process performed for the one or more endpoint devices, and a second attestation process performed for the gateway. The trust score is sent to an analytics server. The trust score is configured to be used by the analytics server to determine an alert and/or a command based on the trust score.

DEVICE AND METHOD FOR VEHICLE-TO-X COMMUNICATION IN ACCORDANCE WITH A DEGREE OF TRUST
20210219139 · 2021-07-15 ·

A vehicle-to-X communication device for a vehicle, containing: a sending device for sending out vehicle-to-X messages, a receiving device for receiving vehicle-to-X messages, and a processing apparatus for processing vehicle-to-X messages to be sent and received. The communication device is configured to send out information for identifying a manufacturer of the vehicle and is furthermore configured to determine, by the processing apparatus, a level of trust of a vehicle-to-X message of a further vehicle received by the receiving device, utilizing information for identifying a manufacturer of the further vehicle which is contained by the vehicle-to-X message of the further vehicle. Furthermore, a corresponding method is disclosed.

SELECTING A NON-3GPP ACCESS NETWORK

Apparatuses, methods, and systems are disclosed for selecting a non-3GPP access network. One apparatus includes a processor and a transceiver for communicating with one or more non-3GPP access networks. The processor creates a first list of available PLMNs connectable via non-3GPP access networks. Here, the first list indicates one or more trusted connectivity types supported for each PLMN. The processor selects a first PLMN and a first connectivity type supported by the first PLMN. The processor creates a second list of available non-3GPP access networks. The processor selects a highest priority available non-3GPP network that supports the first connectivity type to the first PLMN. The processor begins a connectivity procedure with the first PLMN using the first connectivity type over the selected non-3GPP access network.

MULTI-FACTOR AUTONOMOUS SIM LOCK

Aspects of the subject disclosure may include, for example, initializing a secure timer in a wireless device, determining whether a subscriber identification module (SIM) card installed in the wireless device comprises a carrier identity that matches a carrier identity stored in the machine-readable medium, establishing a network connection with a trusted server, starting the secure timer if the SIM card and network connection are satisfactory, periodically checking the network connection and SIM card until expiry of the secure timer, penalizing the secure timer responsive to a failure of the network connection or SIM card check, and responsive to expiry of the secure timer, unlocking a SIM lock. Other embodiments are disclosed.

Complex composite tokens
11057778 · 2021-07-06 · ·

Technologies are shown for trust delegation that involve receiving a first request from a subject client and responding by sending a first token having first permissions to the subject client. A second request from a first actor includes the first token and responding involves linking the first actor to the subject client in a trust stack and sending a second token to the first actor with second permissions, the second token being a first complex token that identifies the subject client and the first actor. A third request from a second actor includes the second token and responding to the third request involves linking the second actor to the first actor in the trust stack, and sending a third token to the second actor partner with third permissions, the third token being a second complex token that identifies the first actor and the second actor.