Patent classifications
H04W12/66
Detecting unauthorized access to a wireless network
Systems and methods detect a potential hacking attack by monitoring the number and timing of DELBA (Delete Block Acknowledgement) action frames. When the number and timing of the DELBA action frames correspond to an unauthorized access pattern, an unauthorized access is detected. The potential unauthorized access may be detected by an access point (AP) or by the AP and a backend system. When a potential unauthorized access is detected, the AP may remain in silent mode for a longer period of time and limit access to the network to only trusted devices. In addition, an alarm or other notification of the potential unauthorized access may be provided to a user or other designated contact.
Network access method and device
This application discloses a network access method and device. The method includes: receiving, by a first management entity, a first request message sent by a first terminal, where the first request message includes at least a first identifier of a second terminal; determining, by the first management entity based on a first condition, whether the second terminal can access a network by using the first terminal, where the first condition includes at least that the first identifier of the second terminal belongs to a list of at least one terminal having a trust relationship with the first terminal, and the list includes at least a first identifier of the at least one terminal having the trust relationship with the first terminal. Legality of access by a wearable device to a network by using a user terminal can be authenticated by using the method and device in this application.
Wireless network authorization using a trusted authenticator
A method of granting access to a wireless network is provided allowing approval by a trusted authenticator. The method includes receiving a request to join a wireless network at a gateway from a client device, determining with the gateway whether the client device is within a predefined trusted zone, sending a notification of a potential new connection with the client device from the gateway to the trusted authenticator. The trusted authenticator then provides a response regarding the potential new connection, wherein the gateway denies network access to the client device when the gateway determines that the client device is outside the trusted zone or when the response from the trusted authenticator rejects the potential new connection, and wherein the gateway grants network access to the client device when the gateway determines that the client device is inside the trusted zone and when the response from the trusted authenticator approves the potential new connection.
VOICE-BASED TIME-SENSITIVE TASK PROCESSING OVER A HIGH GENERATION CELLULAR NETWORK
Aspects of the disclosure relate to voice-based time-sensitive task processing over a high generation cellular network. A computing platform may establish a communication channel with a computing device. The computing platform may authenticate a user of the computing device, where the user is authorized to access the enterprise server. Then, the computing platform may detect, via the communication interface, a voice-based interaction from the authenticated user. The computing platform may cause the voice-based interaction to be captured as audio data. Subsequently, the computing platform may transform the audio data to textual data. The computing platform may analyze the textual data to identify a time-sensitive task related to an entity. Then, the computing platform may generate, based on the identified time-sensitive task, one or more instructions to execute the time-sensitive task. Subsequently, the computing platform may send, to an enterprise server, the one or more instructions to execute the time-sensitive task.
Systems and Methods for Activating Functionality
Broadly speaking, embodiments of the present techniques provide methods for activating functionality on a client device when the client device is determined by a sensor to be in a particular environment. Advantageously, the client device and sensor(s) do not communicate directly so there is no requirement for a trust relationship to be established therebetween, which may consume power, take time and may require user involvement. The functionality on the client device may instead be activated by a trusted server, and the trust relationship may be established when a user of the client device registers to use the system.
Authenticating an unknown device based on relationships with other devices in a group of devices
Provided are techniques for authenticating an unknown device. For a first device in an internet of things network that includes a second device and forms a list of trusted devices, a distance between the first device and the second device is determined. A level of trust for the second device is identified based on the distance, wherein the level of trust specifies a level of data sharing. Reputation ranking is performed for the second device based on the level of trust. The reputation ranking is used to assign a trust score to the second device. Based on determining that the trust score exceeds a trust threshold, access is provided to the second device.
A METHOD AND A SYSTEM FOR ESTABLISHING A CONNECTION BETWEEN AN ON-BOARD VEHICLE NETWORK SERVICE AND AN EXTERNAL APPLICATION
The invention relates to a method and system for establishing a connection between a vehicle network service and an external application. The method comprises: in a vehicle (102), defining (S1) a trusted hotspot device (104) external to a vehicle gateway (106), the trusted hotspot device being connected to the vehicle gateway; in the trusted hotspot device, receiving (S2) a request from an application external to the vehicle requesting access to a service (108) on the vehicle network (110) via the vehicle gateway; in the vehicle gateway, determining (S3) if the requested vehicle network service is available on the vehicle network (110); and if the requested vehicle network service is available on the vehicle network, configuring (S4) the vehicle gateway to allow the requesting application to communicate with the requested vehicle network service.
WEIGHTED SOURCE DATA SECURED ON BLOCKCHAINS
Technologies are shown for secure management of evaluation data that involves receiving an evaluation value signal from a source, the evaluation value signal relating to an evaluation entity having an evaluation score secured on an evaluation data blockchain and verifying whether the source is identified in trusted source data. If the source is trusted, then the technology involves obtaining a weight associated with the source, obtaining the evaluation score for the evaluation entity from a first evaluation data block in the evaluation data blockchain, where the first evaluation data block is a most recent evaluation data block in the evaluation data blockchain, calculating a new evaluation score based on the evaluation score obtained from the first evaluation data block and the received valuation signal weighted according to the weight associated with the source, and securely committing the new evaluation score to the evaluation data blockchain in another evaluation data block
System and Method for Trustworthy Internet Whitelists
Information is received from a first networked device for a first user and from a second networked device for a second user. The first user and the second user are verified and registered. A first set of data for the first user and a second set of data for the second user that each specify one or more network parameters per network address that communicates with each user are received from a networked collector device. Addresses are selected from each of the first set and the second set where each of the one or more network parameters are above a first activity threshold level for that parameter. A first set and a second set of first level activity addresses are produced. A whitelist is generated for the first user from an intersection of the first set of first level activity addresses and the second set of first level activity addresses.
MULTI-FACTOR AUTHENTICATION OF CALLER IDENTIFICATION (ID) IDENTIFIERS
Systems and methods for multi-factor authentication of a caller identification (ID) identifier are disclosed. In embodiments, a method includes: receiving, by a computing device of a call recipient, a call request message from a remote caller device of a caller, the call request message including an authentication token shared between the caller and the call recipient, and an identifier; authenticating the caller using the authentication token; saving an authorized caller record in an authorized caller list on the computing device, the authorized caller record including the identifier; receiving an incoming telephone call from the caller, the incoming call including a caller ID identifier; determining that the caller ID identifier matches the identifier in the authorized caller record; and initiating completion of the call based on the determining that the caller ID identifier matches the identifier in the authorized caller record.